SlideShare a Scribd company logo
0 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic
Security in the Era of
Big M2M Data
Glen Koskela Big Data & Security session
CTO Nordic ECT Forum, October 2nd, 2013, Helsinki
1 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic
By 9.10 AM This Morning…
Our every activity is
being catalogued,
analyzed, and
leveraged through
innovative new
technologies.
Business data.
Public data.
Social data.
Machine data.
Ability to deliver tangible
insights and competitive
advantages.
2 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic
A New Way of Doing Business
Economically extract
value from very large
volumes of a wide
variety of data, by
enabling high-velocity
capture, discovery,
and/or analysis.
First 5 kilobytes are
the hardest…
The focus will shift from
small math to big math
sensing, discovery,
reasoning, and decision.
3 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic
http://www.flickr.com/photos/streamishmc/6865511263/
M2M is Big Part of Big Data
Machines are
exceedingly discreet,
melting into the fabric
of our daily lives to go
unnoticed.
All sorts of machinery,
devices and objects –
literally anywhere and
everywhere.
Game changing.
Future M2M deployments
will reach deeper into
business operations.
4 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic
Insights We Can’t Even Imagine Today
Initially will have a
huge impact on level
playing fields.
Later with openness
and share-ability
allows more common
good through
nonprofits and civic
organizations.
Utility of data is limited
by our ability to
interpret and use it.
http://www.flickr.com/photos/mattgrommes/2665277890/
5 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic
Mobile And GPS Data Logs…
Your phone knows
more about you
than you about it –
and with that so
does your operator. Qualitative POI analysis
can determine place of
residence, place of
work, social status,
family life and routine…
6 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic
Data Without Data Entry
Created data.
Provoked data.
Transacted data.
Compiled data.
Experimental data.
Captured data.
User-generated data.
Not Entered.
Not Yours.
Not Big.
Not Data.
7 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic
Continuous Screening And Profiling
As we go about our everyday lives, we leave
behind digital footprints that, when combined,
could denote unique aspects about ourselves.
Define exact meaning of ”ethics”
in ”convenience”, ”commerce”,
”care”, and ”control”.
8 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic
Invisible Algorithmic Editing of the Web?
Glen (Finland)
”killed the mammoth” Matsuyama (Japan)
”nature”
Markus (Germany)
”stop climate change”
Richard (US)
”nonsense”
Alex (US)
”extreme weather”
We are all actors, we just don’t know what the play is about.
9 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic
Semi-public Corners of the Internet
http://www.flickr.com/photos/jhansensnaps/4394321300/
Data brokers are running
their data through
advanced algorithms that
can make “alarmingly
personal predictions
about our health,
financial status, interests,
sexual orientation,
religious beliefs, politics
and habits.”
Scientific apps are
commonly generalizations.
Managerial apps lean
toward particularization.
10 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic
Anonymized? Maybe. Maybe It Isn’t.
The technological
limitations that
define ‘‘personally
identifying
information’’ are
constantly
changing. Social ”me” accepts
significant control-loss.
11 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic
Who Are You? What Are You Worth?
Age, Gender, Zip, Household Income, Marital Status, Presence of Children, Home Owner Status, Home Market Value, Length of Residence,
High Net Worth, Occupation, Education, Arts & Crafts, Blogging, Books, Business, Health & Wellness, News & Current Events, Automotive,
Baby Product Buyer, Beauty, Charitable Donor, Cooking, Discount Shopper, High-End Brand Buyer, Home & Garden, Home Improvement,
Luxury Goods & Jewelry, Magazine Buyer, Outdoor & Adventure, Pets, Sports, Technology, Travel,… only giving a person’s email address!
“We observe deep anonymization practices…”
“The great threat to individual liberty in the digital age comes from companies that use our data to
enrich themselves — buying and selling our most intimate details for their own corporate benefit.”
-Viviane Reding, European Commissioner for Justice, Fundamental Rights and Citizenship
12 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic
http://www.flickr.com/photos/vfsdigitaldesign/6077020797/
Data Repurposed For Other Uses
The worst sort of
bad data: data
that gets you in
hot water.
Service denial
may become
increasingly
apparent in many
contexts
What information can
be held against you?
13 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic
External Threats
http://www.flickr.com/photos/nicholassmale/4770819852/
Biggest security challenges of M2M are remote
management of M2M devices and data transmission in
the absence of direct human-machine interaction.
If your laptop crashes you’ll have a bad day,
but if your car crashes…
14 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic
Let Me Introduce You To A Few Black Hats
Compromising Industrial Facilities From 40 Miles Away.
Energy Fraud and Orchestrated Blackouts.
Implantable Medical Devices: Hacking Humans.
Breaking and Fixing Critical Infrastructure.
What Google Know About You & How Hackers Can Control Traffic.
Inside vehicle networks. Home Invasion v2.0.
15 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic
Safeguarding Big Data
http://www.flickr.com/photos/42931449@N07/5397530925/
De-identification
Generalization
Suppression
Sub-sampling
Cryptography
Access control
Secure data stores
Efficient audits
Privacy preserving data algorithms
Real time security monitoring
16 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic
Very Real Security And Privacy Challenges
http://www.flickr.com/photos/38446022@N00/4589969792/
Big data can expose hidden patterns to support decision making
in areas ranging from social services to homeland security, and
help solve scientific problems from climatology to nanotechnology.
While big data can yield extremely useful information, it also
presents new challenges with respect to how much data to store
and whether the data will be secure.
17 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic

More Related Content

Viewers also liked

Trends and Innovations
Trends and InnovationsTrends and Innovations
Trends and Innovations
Glen Koskela
 
Pilvet nyt ja tulevaisuudessa – hypestä hyötyihin
Pilvet nyt ja tulevaisuudessa – hypestä hyötyihinPilvet nyt ja tulevaisuudessa – hypestä hyötyihin
Pilvet nyt ja tulevaisuudessa – hypestä hyötyihin
Glen Koskela
 
Sosiaaliset verkostokeinot CIO:n ja liikkeenjohdon strategiatyöskentelyn väli...
Sosiaaliset verkostokeinot CIO:n ja liikkeenjohdon strategiatyöskentelyn väli...Sosiaaliset verkostokeinot CIO:n ja liikkeenjohdon strategiatyöskentelyn väli...
Sosiaaliset verkostokeinot CIO:n ja liikkeenjohdon strategiatyöskentelyn väli...
Glen Koskela
 
Testbeds as enabling digitalization and innovation for health
Testbeds as enabling digitalization and innovation for healthTestbeds as enabling digitalization and innovation for health
Testbeds as enabling digitalization and innovation for health
Glen Koskela
 
Future of End- User IT: Value with Choice, Productivity with Payoffs
Future of End- User IT: Value with Choice, Productivity with PayoffsFuture of End- User IT: Value with Choice, Productivity with Payoffs
Future of End- User IT: Value with Choice, Productivity with Payoffs
Glen Koskela
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Glen Koskela
 
IoT-hype into practical implementations
IoT-hype into practical implementationsIoT-hype into practical implementations
IoT-hype into practical implementations
Glen Koskela
 
Human centric innovation and digitalization
Human centric innovation and digitalizationHuman centric innovation and digitalization
Human centric innovation and digitalization
Glen Koskela
 
Strategic planning, innovation and social collaboration
Strategic planning, innovation and social collaborationStrategic planning, innovation and social collaboration
Strategic planning, innovation and social collaboration
Glen Koskela
 
What business needs to understand about ICT trends
What business needs to understand about ICT trendsWhat business needs to understand about ICT trends
What business needs to understand about ICT trends
Glen Koskela
 
Ilmavaa infraa, koto-Suomessa ja maailmalla
Ilmavaa infraa, koto-Suomessa ja maailmallaIlmavaa infraa, koto-Suomessa ja maailmalla
Ilmavaa infraa, koto-Suomessa ja maailmalla
Glen Koskela
 

Viewers also liked (11)

Trends and Innovations
Trends and InnovationsTrends and Innovations
Trends and Innovations
 
Pilvet nyt ja tulevaisuudessa – hypestä hyötyihin
Pilvet nyt ja tulevaisuudessa – hypestä hyötyihinPilvet nyt ja tulevaisuudessa – hypestä hyötyihin
Pilvet nyt ja tulevaisuudessa – hypestä hyötyihin
 
Sosiaaliset verkostokeinot CIO:n ja liikkeenjohdon strategiatyöskentelyn väli...
Sosiaaliset verkostokeinot CIO:n ja liikkeenjohdon strategiatyöskentelyn väli...Sosiaaliset verkostokeinot CIO:n ja liikkeenjohdon strategiatyöskentelyn väli...
Sosiaaliset verkostokeinot CIO:n ja liikkeenjohdon strategiatyöskentelyn väli...
 
Testbeds as enabling digitalization and innovation for health
Testbeds as enabling digitalization and innovation for healthTestbeds as enabling digitalization and innovation for health
Testbeds as enabling digitalization and innovation for health
 
Future of End- User IT: Value with Choice, Productivity with Payoffs
Future of End- User IT: Value with Choice, Productivity with PayoffsFuture of End- User IT: Value with Choice, Productivity with Payoffs
Future of End- User IT: Value with Choice, Productivity with Payoffs
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
IoT-hype into practical implementations
IoT-hype into practical implementationsIoT-hype into practical implementations
IoT-hype into practical implementations
 
Human centric innovation and digitalization
Human centric innovation and digitalizationHuman centric innovation and digitalization
Human centric innovation and digitalization
 
Strategic planning, innovation and social collaboration
Strategic planning, innovation and social collaborationStrategic planning, innovation and social collaboration
Strategic planning, innovation and social collaboration
 
What business needs to understand about ICT trends
What business needs to understand about ICT trendsWhat business needs to understand about ICT trends
What business needs to understand about ICT trends
 
Ilmavaa infraa, koto-Suomessa ja maailmalla
Ilmavaa infraa, koto-Suomessa ja maailmallaIlmavaa infraa, koto-Suomessa ja maailmalla
Ilmavaa infraa, koto-Suomessa ja maailmalla
 

Similar to Security in the Era of Big M2M Data

Internet of Things - IoT Webinar 2013
Internet of Things - IoT Webinar 2013Internet of Things - IoT Webinar 2013
Internet of Things - IoT Webinar 2013
Desiree Miloshevic
 
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @DesIo t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
Desiree Miloshevic
 
DMS Expo: Safe Bets and Long Shots
DMS Expo: Safe Bets and Long ShotsDMS Expo: Safe Bets and Long Shots
DMS Expo: Safe Bets and Long Shots
Rich Medina
 
What Smartphones Can Teach Futurists
What Smartphones Can Teach FuturistsWhat Smartphones Can Teach Futurists
What Smartphones Can Teach Futurists
Cynthia G. Wagner
 
What smartphones can teach futurists
What smartphones can teach futuristsWhat smartphones can teach futurists
What smartphones can teach futurists
David Wood
 
The 5 Biggest Data Science Trends In 2022
The 5 Biggest Data Science Trends In 2022The 5 Biggest Data Science Trends In 2022
The 5 Biggest Data Science Trends In 2022
Bernard Marr
 
TNO cyber security perspectives 2013
TNO cyber security perspectives 2013TNO cyber security perspectives 2013
TNO cyber security perspectives 2013
VeiligDigitaalOndernemen
 
Fontys Eric van Tol
Fontys Eric van TolFontys Eric van Tol
Fontys Eric van Tol
TalentEvent
 
The Great Confusion: The Digital Economy Continues to Surprise
The Great Confusion: The Digital Economy Continues to SurpriseThe Great Confusion: The Digital Economy Continues to Surprise
The Great Confusion: The Digital Economy Continues to Surprise
Petri Rouvinen
 
US Office of Personnel Management: Notes on "Big Data"
US Office of Personnel Management: Notes on  "Big Data" US Office of Personnel Management: Notes on  "Big Data"
US Office of Personnel Management: Notes on "Big Data"
Tom Moritz
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
mayank272369
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
GFI Software
 
Strata Conference NYC 2013 Full Version
Strata Conference NYC 2013 Full VersionStrata Conference NYC 2013 Full Version
Strata Conference NYC 2013 Full VersionTaewook Eom
 
4.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.134.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.13
Signals Defense, LLC
 
Wearable computing
Wearable computingWearable computing
Wearable computing
Stewart Locke
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
aulasnilda
 
Wearable computing
Wearable computingWearable computing
Wearable computing
Stewart Locke
 
Age Friendly Economy - Introduction to Big Data
Age Friendly Economy - Introduction to Big DataAge Friendly Economy - Introduction to Big Data
Age Friendly Economy - Introduction to Big Data
AgeFriendlyEconomy
 
Eric van tol
Eric van tolEric van tol
Eric van tol
BigDataExpo
 

Similar to Security in the Era of Big M2M Data (20)

Internet of Things - IoT Webinar 2013
Internet of Things - IoT Webinar 2013Internet of Things - IoT Webinar 2013
Internet of Things - IoT Webinar 2013
 
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @DesIo t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @Des
 
DMS Expo: Safe Bets and Long Shots
DMS Expo: Safe Bets and Long ShotsDMS Expo: Safe Bets and Long Shots
DMS Expo: Safe Bets and Long Shots
 
What Smartphones Can Teach Futurists
What Smartphones Can Teach FuturistsWhat Smartphones Can Teach Futurists
What Smartphones Can Teach Futurists
 
What smartphones can teach futurists
What smartphones can teach futuristsWhat smartphones can teach futurists
What smartphones can teach futurists
 
The 5 Biggest Data Science Trends In 2022
The 5 Biggest Data Science Trends In 2022The 5 Biggest Data Science Trends In 2022
The 5 Biggest Data Science Trends In 2022
 
TNO cyber security perspectives 2013
TNO cyber security perspectives 2013TNO cyber security perspectives 2013
TNO cyber security perspectives 2013
 
Fontys Eric van Tol
Fontys Eric van TolFontys Eric van Tol
Fontys Eric van Tol
 
The Great Confusion: The Digital Economy Continues to Surprise
The Great Confusion: The Digital Economy Continues to SurpriseThe Great Confusion: The Digital Economy Continues to Surprise
The Great Confusion: The Digital Economy Continues to Surprise
 
US Office of Personnel Management: Notes on "Big Data"
US Office of Personnel Management: Notes on  "Big Data" US Office of Personnel Management: Notes on  "Big Data"
US Office of Personnel Management: Notes on "Big Data"
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Strata Conference NYC 2013 Full Version
Strata Conference NYC 2013 Full VersionStrata Conference NYC 2013 Full Version
Strata Conference NYC 2013 Full Version
 
4.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.134.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.13
 
Wearable computing
Wearable computingWearable computing
Wearable computing
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
 
Wearable computing
Wearable computingWearable computing
Wearable computing
 
Wearable computing
Wearable computingWearable computing
Wearable computing
 
Age Friendly Economy - Introduction to Big Data
Age Friendly Economy - Introduction to Big DataAge Friendly Economy - Introduction to Big Data
Age Friendly Economy - Introduction to Big Data
 
Eric van tol
Eric van tolEric van tol
Eric van tol
 

More from Glen Koskela

Using Blockchain to Exchange Retail Value
Using Blockchain to Exchange Retail ValueUsing Blockchain to Exchange Retail Value
Using Blockchain to Exchange Retail Value
Glen Koskela
 
From Frictionless to Human Centric Retail
From Frictionless to Human Centric RetailFrom Frictionless to Human Centric Retail
From Frictionless to Human Centric Retail
Glen Koskela
 
Digital Transformation in the Retail Business
Digital Transformation in the Retail BusinessDigital Transformation in the Retail Business
Digital Transformation in the Retail Business
Glen Koskela
 
Employee and Customer Facing AI Applications
Employee and Customer Facing AI ApplicationsEmployee and Customer Facing AI Applications
Employee and Customer Facing AI Applications
Glen Koskela
 
Digital Annealer Keynote
Digital Annealer KeynoteDigital Annealer Keynote
Digital Annealer Keynote
Glen Koskela
 
Social (assistive) robots
Social (assistive) robotsSocial (assistive) robots
Social (assistive) robots
Glen Koskela
 
Differentiation through digital innovation and transformation
Differentiation through digital innovation and transformationDifferentiation through digital innovation and transformation
Differentiation through digital innovation and transformation
Glen Koskela
 
From digitalization to innovation and transformation
From digitalization to innovation and transformationFrom digitalization to innovation and transformation
From digitalization to innovation and transformation
Glen Koskela
 
IoT trends and innovations
IoT trends and innovationsIoT trends and innovations
IoT trends and innovations
Glen Koskela
 
Building an innovative future
Building an innovative futureBuilding an innovative future
Building an innovative future
Glen Koskela
 
Dream of the smart city
Dream of the smart cityDream of the smart city
Dream of the smart city
Glen Koskela
 
Tulevaisuuden tietotyötä
Tulevaisuuden tietotyötäTulevaisuuden tietotyötä
Tulevaisuuden tietotyötä
Glen Koskela
 
Industrial IoT based on SAP Technology
Industrial IoT based on SAP TechnologyIndustrial IoT based on SAP Technology
Industrial IoT based on SAP Technology
Glen Koskela
 
Could Service Provider Forum
Could Service Provider ForumCould Service Provider Forum
Could Service Provider Forum
Glen Koskela
 
IoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gkoIoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gko
Glen Koskela
 
Stories of digitalization, 2017 05-09, gko
Stories of digitalization, 2017 05-09, gkoStories of digitalization, 2017 05-09, gko
Stories of digitalization, 2017 05-09, gko
Glen Koskela
 
Artificial intelligence (wo video), 2017 05-23, gko
Artificial intelligence (wo video), 2017 05-23, gkoArtificial intelligence (wo video), 2017 05-23, gko
Artificial intelligence (wo video), 2017 05-23, gko
Glen Koskela
 
Technology innovation through AI
Technology innovation through AITechnology innovation through AI
Technology innovation through AI
Glen Koskela
 
Mobile Cloud Apps, a Global Dial Tone
Mobile Cloud Apps, a Global Dial ToneMobile Cloud Apps, a Global Dial Tone
Mobile Cloud Apps, a Global Dial Tone
Glen Koskela
 

More from Glen Koskela (19)

Using Blockchain to Exchange Retail Value
Using Blockchain to Exchange Retail ValueUsing Blockchain to Exchange Retail Value
Using Blockchain to Exchange Retail Value
 
From Frictionless to Human Centric Retail
From Frictionless to Human Centric RetailFrom Frictionless to Human Centric Retail
From Frictionless to Human Centric Retail
 
Digital Transformation in the Retail Business
Digital Transformation in the Retail BusinessDigital Transformation in the Retail Business
Digital Transformation in the Retail Business
 
Employee and Customer Facing AI Applications
Employee and Customer Facing AI ApplicationsEmployee and Customer Facing AI Applications
Employee and Customer Facing AI Applications
 
Digital Annealer Keynote
Digital Annealer KeynoteDigital Annealer Keynote
Digital Annealer Keynote
 
Social (assistive) robots
Social (assistive) robotsSocial (assistive) robots
Social (assistive) robots
 
Differentiation through digital innovation and transformation
Differentiation through digital innovation and transformationDifferentiation through digital innovation and transformation
Differentiation through digital innovation and transformation
 
From digitalization to innovation and transformation
From digitalization to innovation and transformationFrom digitalization to innovation and transformation
From digitalization to innovation and transformation
 
IoT trends and innovations
IoT trends and innovationsIoT trends and innovations
IoT trends and innovations
 
Building an innovative future
Building an innovative futureBuilding an innovative future
Building an innovative future
 
Dream of the smart city
Dream of the smart cityDream of the smart city
Dream of the smart city
 
Tulevaisuuden tietotyötä
Tulevaisuuden tietotyötäTulevaisuuden tietotyötä
Tulevaisuuden tietotyötä
 
Industrial IoT based on SAP Technology
Industrial IoT based on SAP TechnologyIndustrial IoT based on SAP Technology
Industrial IoT based on SAP Technology
 
Could Service Provider Forum
Could Service Provider ForumCould Service Provider Forum
Could Service Provider Forum
 
IoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gkoIoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gko
 
Stories of digitalization, 2017 05-09, gko
Stories of digitalization, 2017 05-09, gkoStories of digitalization, 2017 05-09, gko
Stories of digitalization, 2017 05-09, gko
 
Artificial intelligence (wo video), 2017 05-23, gko
Artificial intelligence (wo video), 2017 05-23, gkoArtificial intelligence (wo video), 2017 05-23, gko
Artificial intelligence (wo video), 2017 05-23, gko
 
Technology innovation through AI
Technology innovation through AITechnology innovation through AI
Technology innovation through AI
 
Mobile Cloud Apps, a Global Dial Tone
Mobile Cloud Apps, a Global Dial ToneMobile Cloud Apps, a Global Dial Tone
Mobile Cloud Apps, a Global Dial Tone
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 

Security in the Era of Big M2M Data

  • 1. 0 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic Security in the Era of Big M2M Data Glen Koskela Big Data & Security session CTO Nordic ECT Forum, October 2nd, 2013, Helsinki
  • 2. 1 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic By 9.10 AM This Morning… Our every activity is being catalogued, analyzed, and leveraged through innovative new technologies. Business data. Public data. Social data. Machine data. Ability to deliver tangible insights and competitive advantages.
  • 3. 2 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic A New Way of Doing Business Economically extract value from very large volumes of a wide variety of data, by enabling high-velocity capture, discovery, and/or analysis. First 5 kilobytes are the hardest… The focus will shift from small math to big math sensing, discovery, reasoning, and decision.
  • 4. 3 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic http://www.flickr.com/photos/streamishmc/6865511263/ M2M is Big Part of Big Data Machines are exceedingly discreet, melting into the fabric of our daily lives to go unnoticed. All sorts of machinery, devices and objects – literally anywhere and everywhere. Game changing. Future M2M deployments will reach deeper into business operations.
  • 5. 4 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic Insights We Can’t Even Imagine Today Initially will have a huge impact on level playing fields. Later with openness and share-ability allows more common good through nonprofits and civic organizations. Utility of data is limited by our ability to interpret and use it. http://www.flickr.com/photos/mattgrommes/2665277890/
  • 6. 5 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic Mobile And GPS Data Logs… Your phone knows more about you than you about it – and with that so does your operator. Qualitative POI analysis can determine place of residence, place of work, social status, family life and routine…
  • 7. 6 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic Data Without Data Entry Created data. Provoked data. Transacted data. Compiled data. Experimental data. Captured data. User-generated data. Not Entered. Not Yours. Not Big. Not Data.
  • 8. 7 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic Continuous Screening And Profiling As we go about our everyday lives, we leave behind digital footprints that, when combined, could denote unique aspects about ourselves. Define exact meaning of ”ethics” in ”convenience”, ”commerce”, ”care”, and ”control”.
  • 9. 8 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic Invisible Algorithmic Editing of the Web? Glen (Finland) ”killed the mammoth” Matsuyama (Japan) ”nature” Markus (Germany) ”stop climate change” Richard (US) ”nonsense” Alex (US) ”extreme weather” We are all actors, we just don’t know what the play is about.
  • 10. 9 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic Semi-public Corners of the Internet http://www.flickr.com/photos/jhansensnaps/4394321300/ Data brokers are running their data through advanced algorithms that can make “alarmingly personal predictions about our health, financial status, interests, sexual orientation, religious beliefs, politics and habits.” Scientific apps are commonly generalizations. Managerial apps lean toward particularization.
  • 11. 10 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic Anonymized? Maybe. Maybe It Isn’t. The technological limitations that define ‘‘personally identifying information’’ are constantly changing. Social ”me” accepts significant control-loss.
  • 12. 11 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic Who Are You? What Are You Worth? Age, Gender, Zip, Household Income, Marital Status, Presence of Children, Home Owner Status, Home Market Value, Length of Residence, High Net Worth, Occupation, Education, Arts & Crafts, Blogging, Books, Business, Health & Wellness, News & Current Events, Automotive, Baby Product Buyer, Beauty, Charitable Donor, Cooking, Discount Shopper, High-End Brand Buyer, Home & Garden, Home Improvement, Luxury Goods & Jewelry, Magazine Buyer, Outdoor & Adventure, Pets, Sports, Technology, Travel,… only giving a person’s email address! “We observe deep anonymization practices…” “The great threat to individual liberty in the digital age comes from companies that use our data to enrich themselves — buying and selling our most intimate details for their own corporate benefit.” -Viviane Reding, European Commissioner for Justice, Fundamental Rights and Citizenship
  • 13. 12 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic http://www.flickr.com/photos/vfsdigitaldesign/6077020797/ Data Repurposed For Other Uses The worst sort of bad data: data that gets you in hot water. Service denial may become increasingly apparent in many contexts What information can be held against you?
  • 14. 13 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic External Threats http://www.flickr.com/photos/nicholassmale/4770819852/ Biggest security challenges of M2M are remote management of M2M devices and data transmission in the absence of direct human-machine interaction. If your laptop crashes you’ll have a bad day, but if your car crashes…
  • 15. 14 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic Let Me Introduce You To A Few Black Hats Compromising Industrial Facilities From 40 Miles Away. Energy Fraud and Orchestrated Blackouts. Implantable Medical Devices: Hacking Humans. Breaking and Fixing Critical Infrastructure. What Google Know About You & How Hackers Can Control Traffic. Inside vehicle networks. Home Invasion v2.0.
  • 16. 15 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic Safeguarding Big Data http://www.flickr.com/photos/42931449@N07/5397530925/ De-identification Generalization Suppression Sub-sampling Cryptography Access control Secure data stores Efficient audits Privacy preserving data algorithms Real time security monitoring
  • 17. 16 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic Very Real Security And Privacy Challenges http://www.flickr.com/photos/38446022@N00/4589969792/ Big data can expose hidden patterns to support decision making in areas ranging from social services to homeland security, and help solve scientific problems from climatology to nanotechnology. While big data can yield extremely useful information, it also presents new challenges with respect to how much data to store and whether the data will be secure.
  • 18. 17 Copyright 2013 FUJITSUGlen Koskela, CTO Nordic