SlideShare a Scribd company logo
Tracking Identity on the Supply Chain
Heather Vescent
CEO, The Purple Tornado
Who am I
Heather Vescent
• CEO/Researcher,
The Purple Tornado
Strategic Intelligence Consultancy
• Author, 3 DHS Funded ID Reports
• Author, Cyber Attack Manual
• Author, SSI Report
• M.S. Strategic Foresight, U.H.
• Filmmaker, 14 Films
Research Background
• Private Sector Digital Identity
• Funded by DHS Science &
Technology Cybersecurity Division
• Gaps: bit.ly/NPEreport
• Supply Chain: bit.ly/GSCreport
Objective: To understand digital identity
technology used to track goods on the supply
chain, including identifiers, sensors and data
associated with a physical object.
BILLIONS OF IDENTITIES
Billions of Identities
• Humans
Billions of Identities
• Humans
• Companies
• IoT objects (smart things)
• Tracking (dumb things)
• Robots
• Data
• Information
128+ Billion Identities by 2030?
180 Million Companies
2 Gov + 3 Business IDs
900 million identities
7.7 Billion Humans
34-48% online
2 Gov + 5 Online ID
18-26+ billion identities
(FB: 2.38B, G:2+B users)
25-75 billion IoT devices
(by 2021)
35 million packages
daily shipped/tracked
(UPS & FedEx)
9 billion yearly
What is a Non-Person Entity Identity?
Company
(legal entity)
Thing
(IoT device)
What is a Non-Person Entity Identity?
Company
(legal entity)
System
(network)
Thing
(IoT device)
What is a Non-Person Entity Identity?
Company
(legal entity)
NPEs are given identity (Registries)
• Identity is used to create
more identifiers
Web of Organizational Trust
NPE is complex
NPE Identities
• Relate to each other
• Interact with each other
• Depend on each other
Why important to Government/DHS?
• Governments give legal entities identity
• Legal identity is important in many industries
o Banking & Finance (KYC, AML, UBO, Beneficiary)
o Global Trade
• Customs
o Internet of Things is growing exponentially
• Security of sensors
• Authenticity of sensor collected data
• Who is responsible/liable when things go wrong?
14
Gap: NPE Responsibility
• PROBLEM: A company (which is an NPE) owns robots (which are
NPEs) that work in a factory. A company (an NPE) manufactures an
autonomous vehicle (an NPE). A company (an NPE) manufactures a
pacemaker (an NPE) and also collects data about the pacemaker’s
system as well as data about the human system whose the device is
embedded in.
• IMPACT: This could become an issue in the future, for example the
case of liability of self-driving car, or a factory robot, that isn’t directly
mapped to an individual supervisor or “driver” but under corporate or
algorithmic control.
15
Responsibility falls on the human
• Who owns it?
• Who is liable when something goes wrong?
• Humans take actions for NPEs (wire transfer)
• NPEs take action for humans (Nest)
• Data collection (Smart home)
• Data sharing (Ring)
MARKET GAPS
11 Market Gaps
Corporate NPE Gaps IOT NPE Gaps
1. Legal Identity of Corporations 1. Legal Identity of IoT Things
2. Conclusive Ultimate Beneficial Owner 2. Tracking and Auditing in the Supply Chain
3. Conclusive Verified Corporate Data 3. IoT Security Standards
4. Corporate Delegation 4. IT Self-Authentication
5. Real-Time Verified Identity 5. Data Integrity from IoT Sensors
6. NPE Responsibility
Five IoT Market Gaps
IoT NPE Gaps Opportunity
1 Legal Identity of IoT Things Consistent, standard identifiers
2
Tracking and Auditing Goods in the Supply
Chain
Better data collection & sharing
3 IoT Security Standards Increase hardware security
4 IT Self-Authentication Trust the device
5 Data Integrity from IoT Sensors Trust the data from the device
1: Legal Identity of IoT Things
Identity is built into very few IoT devices. There are
no universal standards or regulations around which
IoT objects have an identity assigned at “birth,”
unlike a baby registry or corporate registry.
• Some companies give IoT devices an identity – but legal
identity is not required.
• Some companies keep registries for devices like
pacemakers or jet engines.
GAP: Legal IoT Identity
2: Tracking & Auditing on the Supply Chain
• PROBLEM: Many goods are tracked and audited as they
flow from manufacturer through the supply chain to the
destination. While many goods are tracked with a barcode or
serial number, there is the desire to more thoroughly track
goods in the supply chain, including their components,
sources of raw material, and the chain of custody.
• IMPACT: Lost income due to IP theft. Lost tax revenue.
Potential terrorist financing.
21
3: IoT Security Standards
• PROBLEM: Smart homes, surveillance devices, connected
appliances, and vehicles have persistent and structural vulnerabilities
that makes them difficult to secure for many real-world situations.
Many tools are designed with weak security and are vulnerable to “IoT
takeovers.”
• IMPACT: The liability ramifications are largely a matter of speculation,
however we can get an idea of some economic impacts by the size of
the ransomware market estimated at $1b in 2016 and $2b in 2017.
22
“Securing IoT devices is a major challenge, and manufacturers tend to focus on
functionality, compatibility requirements, and time-to-market rather than security.”
—Interagency Report on Status of International Cybersecurity Standardization
3. IoT Security Standards
“One of the major reasons the Internet+ is so
insecure today is the absence of government
oversight. Government is by far the most common
way we improve our collective security, and it is
almost certainly the most efficient.”
-Bruce Schneier, Click Here to Kill Everyone
4: IoT Self-Authentication
• PROBLEM: The technical process of
authenticating the veracity of the IoT device
and any data collected by the IoT device.
• IMPACT: Limits utility to high-exposure IoT
applications, due to economic cost. Attack
surfaces remain due to high cost to implement
broadly.
24
5: Data Integrity from IoT Sensors
• PROBLEM: How do I know the data coming off the sensor data is
accurate? There needs to be mechanisms to know data coming off
sensors, drones, and other IoT data-generating devices is reliable
for high-security applications.
• IMPACT: Contamination or distortion of data from smart city
sensors, lightweight devices that control utility grids or operations,
and other cyber-physical systems could do serious real-world
damage if an attack occurred and it took significant time to detect
due to failed monitoring sensors.
25
NPE AND THE SUPPLY CHAIN
Digital Twins & Asset Passports
27
• Digitization
• Standards
• Regulations
Current Trends
28
Shanzhai: Culture of Counterfeiting
1. Design nothing from scratch.
2. Buy low, sell high.
3. Innovate for speed & small scale savings.
4. Don’t make what you can buy for less.
5. Cash flow is king.
6. Don’t make it till you have a buyer.
7. There is no proprietary, only results.
– IP takes up an invoice line item ($$), but there is no inventory in a factory for it.
So why pay?
29
• High level
• Can be 20+ steps
between Raw + Refine
depending on suppliers
and manufacturers
• Data is collected and
shared along the way
• Consumption is the
assumption (but there
are always things left
over)
30
Linear Supply Chain
• High level
• Can be 20+ steps
between Raw + Refine
depending on suppliers
and manufacturers
• Data is collected and
shared along the way
• Consumption is the
assumption (but there
are always things left
over)
31
Linear Supply Chain
• Different identifiers for up and
downstream
• Difficult to connect upstream
to downstream
• Increasing trend for
transparency of upstream
materials
32
Upstream/Downstream
• A shifted view of the supply
chain
• Enabling recycling, reusing,
and responsible disposal
“We are going to run out of
virgin materials at some point.”
– Patagonia CEO
33
Circular Supply Chain
Tracking Technology
• Sensors
o Tracking
o RFID
o QR Codes
o IoT Devices
• Distributed data structures
• Data infrastructure
34
Data & Identifiers
• Linking Data
• Data Governance
• Data Harmonization
• Data Aggregation
35
Systemic Problems & Innovations
Problems Innovations
Many Jurisdictions Persistent Identifiers
Industry Collaboration Data Interoperability
Technology Interoperability Time for Adoption
Economic Problems Shift Economic Incentives
36
Quotes
37
“We spend a lot of time maintaining our
corporate identity to ensure that no one’s
stealing it.”
—21 Century Customs Meeting
“A cryptographically, verifiable,
secure, physical identity, on a
physical product that can be digitally
validated that doesn’t intrude with
product performance, or interfere in
consumer privacy. This identity
provides the benefits of supply chain
efficiency, customer delight, post
purchase engagement, warranty
repair, replenishment, transfer of
ownership, and lastly would support
end of life.” —Interviewee
“At some point in time, Chinese or Asian
companies will become a source of creativity. This
will be interesting for the European market
development. At some point, they will realize that
they are not [limited to] the Western bias.”
—Interviewee
Pockets of the Future in the Present
38
Report recommendations
1. Persistent Identifiers
2. Identifier and Data Model Standards
3. Digital Twin
4. Data Portability & System
Interoperability
5. Harmonize Global Regulations
6. Industry Collaboration
7. Activate the Private Sector
39
DECENTRALIZED IDENTITY?
The Vision: A Global Digital Rail
• Technology standards for interoperability
• Trans-National, goes beyond borders
• Governments supported development of new infrastructure by
private sector
– Government of Canada
– DHS investments
• Citizens access Government services without being tracked or
correlated
• Identity issuance and verification
• Digitally native identity and credentials
• What else is possible? IoT??
3: Decentralized Identity
Wallet
ID Issuer
ID Consumer
(Verifier)
Blockchain or Distributed Leger
Legal Identity
Things Identity
Interoperable standards to
implement a common
technology stack.
• DID Spec
• DID Methods
• Universal Resolver
• DID Auth
• Verifiable Credentials
Standards & Specs
OPPORTUNITIES TO
COLLABORATE
Current IoT Vulnerabilities – M3AAWG
• Abuse, takeover
• Sensor data, military and government applications
• IoT built fast, lacks security, out of date quickly
• But in the wild forever, sunsetting is rare
• Other vulnerabilities like electronics components
• Potential new vulns & other unintended consequences
– We can’t necessarily predict what new vulns will be, but we know there will be
new ones! So we need to have the mindset that this won’t be fixed forever.
Designing for IoT identity
• What can we borrow from human ID? Corporate ID?
• What are new problems to consider?
• Data sharing
– machine to machine
– machine to human
– human to machine.
• How is authentication, verifying, assigning, communicating, sharing,
changing, delegation different
– IoT to IoT world?
– IoT to human world?
– Human to human world?
Future Identity System Goals
• Manage a trillion identities
– And all their relationships
• Thrive in dynamic environment
• Enable delegation
– Between humans & NPEs
• Involve automated systems
• Solve current data, privacy problems
• + Messaging
• + Manage Abuse
Why should we care?
• Liability: who pays when something goes wrong?
• Responsibility: who is responsible at a particular time?
• Regulation: increasing trend for more regulation
• Collaboration: rising trend to work together
• Future Proof: envision the true scale of the problem
Working together
• Identity community mostly focused on human identity
• Identity community hasn’t thought much about messaging or
abuse
• Industry 4.0 Vision
• Sensors + Data (Supply Chain)
Thank you
Heather Vescent
• www.thepurpletornado.com
• heathervescent@gmail.com
• vescent@thepurpletornado.com
• @heathervescent
Download NPE: bit.ly/NPEreport
Download Supply Chain: bit.ly/GSCreport

More Related Content

What's hot

eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
SSIMeetup
 
Alastria Digital Identity: the Spanish Blockchain solution for SSI - Carlos P...
Alastria Digital Identity: the Spanish Blockchain solution for SSI - Carlos P...Alastria Digital Identity: the Spanish Blockchain solution for SSI - Carlos P...
Alastria Digital Identity: the Spanish Blockchain solution for SSI - Carlos P...
SSIMeetup
 
Introduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityIntroduction to Self-Sovereign Identity
Introduction to Self-Sovereign Identity
Karyl Fowler
 
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael BoydStreetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
SSIMeetup
 
Blockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access ManagementBlockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access Management
Prabath Siriwardena
 
Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed
SSIMeetup
 
Decentralized Identifiers
Decentralized IdentifiersDecentralized Identifiers
Decentralized Identifiers
Markus Sabadello
 
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
SSIMeetup
 
Verifiable Credentials for Global Supply Chains
Verifiable Credentials for Global Supply ChainsVerifiable Credentials for Global Supply Chains
Verifiable Credentials for Global Supply Chains
Karyl Fowler
 
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...
SSIMeetup
 
Cryptocurrency products from hashCash
Cryptocurrency products from hashCashCryptocurrency products from hashCash
Cryptocurrency products from hashCash
HashCash Consultants
 
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeHyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
SSIMeetup
 
Overview of Decentralized Identity
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized Identity
Jim Flynn
 
Blockchain security a different perspective
Blockchain security a different perspectiveBlockchain security a different perspective
Blockchain security a different perspective
Secunoid Systems Inc
 
Blockchain 101
Blockchain 101Blockchain 101
Blockchain 101
BirthVenue
 
Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs
Vasiliy Suvorov
 
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
SSIMeetup
 
Token Governance in Blockchain Ecosystems
Token Governance in Blockchain EcosystemsToken Governance in Blockchain Ecosystems
Token Governance in Blockchain Ecosystems
Dr. Nikolaus Lipusch
 
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
Evernym
 
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
SSIMeetup
 

What's hot (20)

eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
 
Alastria Digital Identity: the Spanish Blockchain solution for SSI - Carlos P...
Alastria Digital Identity: the Spanish Blockchain solution for SSI - Carlos P...Alastria Digital Identity: the Spanish Blockchain solution for SSI - Carlos P...
Alastria Digital Identity: the Spanish Blockchain solution for SSI - Carlos P...
 
Introduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityIntroduction to Self-Sovereign Identity
Introduction to Self-Sovereign Identity
 
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael BoydStreetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
 
Blockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access ManagementBlockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access Management
 
Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed
 
Decentralized Identifiers
Decentralized IdentifiersDecentralized Identifiers
Decentralized Identifiers
 
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
 
Verifiable Credentials for Global Supply Chains
Verifiable Credentials for Global Supply ChainsVerifiable Credentials for Global Supply Chains
Verifiable Credentials for Global Supply Chains
 
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...
DIDs Demystified: A hands-on intro to DIDs via the Bitcoin Reference (BTCR) D...
 
Cryptocurrency products from hashCash
Cryptocurrency products from hashCashCryptocurrency products from hashCash
Cryptocurrency products from hashCash
 
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeHyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
 
Overview of Decentralized Identity
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized Identity
 
Blockchain security a different perspective
Blockchain security a different perspectiveBlockchain security a different perspective
Blockchain security a different perspective
 
Blockchain 101
Blockchain 101Blockchain 101
Blockchain 101
 
Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs
 
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
 
Token Governance in Blockchain Ecosystems
Token Governance in Blockchain EcosystemsToken Governance in Blockchain Ecosystems
Token Governance in Blockchain Ecosystems
 
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
 
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
 

Similar to Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain

IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
John D. Johnson
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
John D. Johnson
 
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
Adrian Wright
 
Emerging Global Trends in Internet of Things.pptx
Emerging Global Trends in Internet of Things.pptxEmerging Global Trends in Internet of Things.pptx
Emerging Global Trends in Internet of Things.pptx
Roshni814224
 
02_Internet-of-things-Final PPT.pdf
02_Internet-of-things-Final PPT.pdf02_Internet-of-things-Final PPT.pdf
02_Internet-of-things-Final PPT.pdf
PunamSurwase
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
ssuserc5ee4c
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
Janasudhan1
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
SourajitMaity1
 
The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)
Saurabh Yadav
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
ClicTest
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
ChandravadhanaNaraya
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greenebmcmenemy
 
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
bmcmenemy
 
Io t for_scm
Io t for_scmIo t for_scm
Io t for_scm
Sanura Hettiarachchi
 
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptxThe-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
HadHic
 
IoT -Internet of Things
IoT -Internet of ThingsIoT -Internet of Things
IoT -Internet of Things
Joshua Johnston
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)Adam Thierer
 
Internet of Things (IoT
Internet of Things (IoTInternet of Things (IoT
Internet of Things (IoT
paul young cpa, cga
 
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityDr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Pro Mrkt
 

Similar to Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain (20)

IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
 
Emerging Global Trends in Internet of Things.pptx
Emerging Global Trends in Internet of Things.pptxEmerging Global Trends in Internet of Things.pptx
Emerging Global Trends in Internet of Things.pptx
 
02_Internet-of-things-Final PPT.pdf
02_Internet-of-things-Final PPT.pdf02_Internet-of-things-Final PPT.pdf
02_Internet-of-things-Final PPT.pdf
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 
The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
 
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
 
Io t for_scm
Io t for_scmIo t for_scm
Io t for_scm
 
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptxThe-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
 
IOT PPT.pptx
IOT PPT.pptxIOT PPT.pptx
IOT PPT.pptx
 
IoT -Internet of Things
IoT -Internet of ThingsIoT -Internet of Things
IoT -Internet of Things
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
 
Internet of Things (IoT
Internet of Things (IoTInternet of Things (IoT
Internet of Things (IoT
 
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityDr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
 

More from Heather Vescent

Deep Fakes, Digital Identity and Democracy
Deep Fakes, Digital Identity and DemocracyDeep Fakes, Digital Identity and Democracy
Deep Fakes, Digital Identity and Democracy
Heather Vescent
 
An Introduction to Maskirovka aka Information Operations
An Introduction to Maskirovka aka Information OperationsAn Introduction to Maskirovka aka Information Operations
An Introduction to Maskirovka aka Information Operations
Heather Vescent
 
Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019
Heather Vescent
 
Self-Sovereign Identity: An Analysis using Appreciative Inquiry
Self-Sovereign Identity: An Analysis using Appreciative Inquiry Self-Sovereign Identity: An Analysis using Appreciative Inquiry
Self-Sovereign Identity: An Analysis using Appreciative Inquiry
Heather Vescent
 
Payments in the Sharing Economy, Total Payments, Melbourne, Australia
Payments in the Sharing Economy, Total Payments, Melbourne, AustraliaPayments in the Sharing Economy, Total Payments, Melbourne, Australia
Payments in the Sharing Economy, Total Payments, Melbourne, Australia
Heather Vescent
 
Payments and the Sharing Economy - Toronto
Payments and the Sharing Economy - TorontoPayments and the Sharing Economy - Toronto
Payments and the Sharing Economy - Toronto
Heather Vescent
 
What is the Future?
What is the Future?What is the Future?
What is the Future?
Heather Vescent
 
Increasing Women in STEM
Increasing Women in STEMIncreasing Women in STEM
Increasing Women in STEM
Heather Vescent
 
Payments and the Sharing Economy
Payments and the Sharing EconomyPayments and the Sharing Economy
Payments and the Sharing Economy
Heather Vescent
 
Biometric & Identity: Beyond Wearables - Sxsw 2015
Biometric & Identity: Beyond Wearables - Sxsw 2015Biometric & Identity: Beyond Wearables - Sxsw 2015
Biometric & Identity: Beyond Wearables - Sxsw 2015
Heather Vescent
 
Personal Branding 2014 Update by Heathervescent
Personal Branding 2014 Update by HeathervescentPersonal Branding 2014 Update by Heathervescent
Personal Branding 2014 Update by HeathervescentHeather Vescent
 
Bankinter Future Trends Forum 2014 - Future of Currency Recap by Heather Schl...
Bankinter Future Trends Forum 2014 - Future of Currency Recap by Heather Schl...Bankinter Future Trends Forum 2014 - Future of Currency Recap by Heather Schl...
Bankinter Future Trends Forum 2014 - Future of Currency Recap by Heather Schl...
Heather Vescent
 
The New Age of Technology Enhanced Intimacy
The New Age of Technology Enhanced IntimacyThe New Age of Technology Enhanced Intimacy
The New Age of Technology Enhanced Intimacy
Heather Vescent
 
A New Perspective, to solve the world's problems
A New Perspective, to solve the world's problemsA New Perspective, to solve the world's problems
A New Perspective, to solve the world's problemsHeather Vescent
 
A Possibility Tour by heathervescent
A Possibility Tour by heathervescentA Possibility Tour by heathervescent
A Possibility Tour by heathervescent
Heather Vescent
 
Solving the World's Problems
Solving the World's ProblemsSolving the World's Problems
Solving the World's Problems
Heather Vescent
 
Towards a clarification of terms
Towards a clarification of termsTowards a clarification of terms
Towards a clarification of terms
Heather Vescent
 
The Demographic Transition: A Systems Model
The Demographic Transition: A Systems ModelThe Demographic Transition: A Systems Model
The Demographic Transition: A Systems Model
Heather Vescent
 
Making Near Future Video Scenarios
Making Near Future Video ScenariosMaking Near Future Video Scenarios
Making Near Future Video Scenarios
Heather Vescent
 

More from Heather Vescent (20)

Deep Fakes, Digital Identity and Democracy
Deep Fakes, Digital Identity and DemocracyDeep Fakes, Digital Identity and Democracy
Deep Fakes, Digital Identity and Democracy
 
An Introduction to Maskirovka aka Information Operations
An Introduction to Maskirovka aka Information OperationsAn Introduction to Maskirovka aka Information Operations
An Introduction to Maskirovka aka Information Operations
 
Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019
 
Self-Sovereign Identity: An Analysis using Appreciative Inquiry
Self-Sovereign Identity: An Analysis using Appreciative Inquiry Self-Sovereign Identity: An Analysis using Appreciative Inquiry
Self-Sovereign Identity: An Analysis using Appreciative Inquiry
 
Payments in the Sharing Economy, Total Payments, Melbourne, Australia
Payments in the Sharing Economy, Total Payments, Melbourne, AustraliaPayments in the Sharing Economy, Total Payments, Melbourne, Australia
Payments in the Sharing Economy, Total Payments, Melbourne, Australia
 
Payments and the Sharing Economy - Toronto
Payments and the Sharing Economy - TorontoPayments and the Sharing Economy - Toronto
Payments and the Sharing Economy - Toronto
 
What is the Future?
What is the Future?What is the Future?
What is the Future?
 
Increasing Women in STEM
Increasing Women in STEMIncreasing Women in STEM
Increasing Women in STEM
 
Payments and the Sharing Economy
Payments and the Sharing EconomyPayments and the Sharing Economy
Payments and the Sharing Economy
 
Biometric & Identity: Beyond Wearables - Sxsw 2015
Biometric & Identity: Beyond Wearables - Sxsw 2015Biometric & Identity: Beyond Wearables - Sxsw 2015
Biometric & Identity: Beyond Wearables - Sxsw 2015
 
Personal Branding 2014 Update by Heathervescent
Personal Branding 2014 Update by HeathervescentPersonal Branding 2014 Update by Heathervescent
Personal Branding 2014 Update by Heathervescent
 
Bankinter Future Trends Forum 2014 - Future of Currency Recap by Heather Schl...
Bankinter Future Trends Forum 2014 - Future of Currency Recap by Heather Schl...Bankinter Future Trends Forum 2014 - Future of Currency Recap by Heather Schl...
Bankinter Future Trends Forum 2014 - Future of Currency Recap by Heather Schl...
 
The New Age of Technology Enhanced Intimacy
The New Age of Technology Enhanced IntimacyThe New Age of Technology Enhanced Intimacy
The New Age of Technology Enhanced Intimacy
 
A New Perspective, to solve the world's problems
A New Perspective, to solve the world's problemsA New Perspective, to solve the world's problems
A New Perspective, to solve the world's problems
 
A Possibility Tour by heathervescent
A Possibility Tour by heathervescentA Possibility Tour by heathervescent
A Possibility Tour by heathervescent
 
Solving the World's Problems
Solving the World's ProblemsSolving the World's Problems
Solving the World's Problems
 
Towards a clarification of terms
Towards a clarification of termsTowards a clarification of terms
Towards a clarification of terms
 
The Demographic Transition: A Systems Model
The Demographic Transition: A Systems ModelThe Demographic Transition: A Systems Model
The Demographic Transition: A Systems Model
 
The Future of Shopping
The Future of ShoppingThe Future of Shopping
The Future of Shopping
 
Making Near Future Video Scenarios
Making Near Future Video ScenariosMaking Near Future Video Scenarios
Making Near Future Video Scenarios
 

Recently uploaded

Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
WilliamRodrigues148
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
Corey Perlman, Social Media Speaker and Consultant
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
LuanWise
 
In the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptxIn the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptx
Adani case
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
DerekIwanaka1
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
HARSHITHV26
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
Norma Mushkat Gaffin
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
Corey Perlman, Social Media Speaker and Consultant
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
FelixPerez547899
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Holger Mueller
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
Lital Barkan
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
uae taxgpt
 

Recently uploaded (20)

Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
 
In the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptxIn the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptx
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
 

Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain

  • 1. Tracking Identity on the Supply Chain Heather Vescent CEO, The Purple Tornado
  • 2. Who am I Heather Vescent • CEO/Researcher, The Purple Tornado Strategic Intelligence Consultancy • Author, 3 DHS Funded ID Reports • Author, Cyber Attack Manual • Author, SSI Report • M.S. Strategic Foresight, U.H. • Filmmaker, 14 Films
  • 3. Research Background • Private Sector Digital Identity • Funded by DHS Science & Technology Cybersecurity Division • Gaps: bit.ly/NPEreport • Supply Chain: bit.ly/GSCreport Objective: To understand digital identity technology used to track goods on the supply chain, including identifiers, sensors and data associated with a physical object.
  • 6. Billions of Identities • Humans • Companies • IoT objects (smart things) • Tracking (dumb things) • Robots • Data • Information
  • 7. 128+ Billion Identities by 2030? 180 Million Companies 2 Gov + 3 Business IDs 900 million identities 7.7 Billion Humans 34-48% online 2 Gov + 5 Online ID 18-26+ billion identities (FB: 2.38B, G:2+B users) 25-75 billion IoT devices (by 2021) 35 million packages daily shipped/tracked (UPS & FedEx) 9 billion yearly
  • 8. What is a Non-Person Entity Identity? Company (legal entity)
  • 9. Thing (IoT device) What is a Non-Person Entity Identity? Company (legal entity)
  • 10. System (network) Thing (IoT device) What is a Non-Person Entity Identity? Company (legal entity)
  • 11. NPEs are given identity (Registries)
  • 12. • Identity is used to create more identifiers Web of Organizational Trust
  • 13. NPE is complex NPE Identities • Relate to each other • Interact with each other • Depend on each other
  • 14. Why important to Government/DHS? • Governments give legal entities identity • Legal identity is important in many industries o Banking & Finance (KYC, AML, UBO, Beneficiary) o Global Trade • Customs o Internet of Things is growing exponentially • Security of sensors • Authenticity of sensor collected data • Who is responsible/liable when things go wrong? 14
  • 15. Gap: NPE Responsibility • PROBLEM: A company (which is an NPE) owns robots (which are NPEs) that work in a factory. A company (an NPE) manufactures an autonomous vehicle (an NPE). A company (an NPE) manufactures a pacemaker (an NPE) and also collects data about the pacemaker’s system as well as data about the human system whose the device is embedded in. • IMPACT: This could become an issue in the future, for example the case of liability of self-driving car, or a factory robot, that isn’t directly mapped to an individual supervisor or “driver” but under corporate or algorithmic control. 15
  • 16. Responsibility falls on the human • Who owns it? • Who is liable when something goes wrong? • Humans take actions for NPEs (wire transfer) • NPEs take action for humans (Nest) • Data collection (Smart home) • Data sharing (Ring)
  • 18. 11 Market Gaps Corporate NPE Gaps IOT NPE Gaps 1. Legal Identity of Corporations 1. Legal Identity of IoT Things 2. Conclusive Ultimate Beneficial Owner 2. Tracking and Auditing in the Supply Chain 3. Conclusive Verified Corporate Data 3. IoT Security Standards 4. Corporate Delegation 4. IT Self-Authentication 5. Real-Time Verified Identity 5. Data Integrity from IoT Sensors 6. NPE Responsibility
  • 19. Five IoT Market Gaps IoT NPE Gaps Opportunity 1 Legal Identity of IoT Things Consistent, standard identifiers 2 Tracking and Auditing Goods in the Supply Chain Better data collection & sharing 3 IoT Security Standards Increase hardware security 4 IT Self-Authentication Trust the device 5 Data Integrity from IoT Sensors Trust the data from the device
  • 20. 1: Legal Identity of IoT Things Identity is built into very few IoT devices. There are no universal standards or regulations around which IoT objects have an identity assigned at “birth,” unlike a baby registry or corporate registry. • Some companies give IoT devices an identity – but legal identity is not required. • Some companies keep registries for devices like pacemakers or jet engines. GAP: Legal IoT Identity
  • 21. 2: Tracking & Auditing on the Supply Chain • PROBLEM: Many goods are tracked and audited as they flow from manufacturer through the supply chain to the destination. While many goods are tracked with a barcode or serial number, there is the desire to more thoroughly track goods in the supply chain, including their components, sources of raw material, and the chain of custody. • IMPACT: Lost income due to IP theft. Lost tax revenue. Potential terrorist financing. 21
  • 22. 3: IoT Security Standards • PROBLEM: Smart homes, surveillance devices, connected appliances, and vehicles have persistent and structural vulnerabilities that makes them difficult to secure for many real-world situations. Many tools are designed with weak security and are vulnerable to “IoT takeovers.” • IMPACT: The liability ramifications are largely a matter of speculation, however we can get an idea of some economic impacts by the size of the ransomware market estimated at $1b in 2016 and $2b in 2017. 22 “Securing IoT devices is a major challenge, and manufacturers tend to focus on functionality, compatibility requirements, and time-to-market rather than security.” —Interagency Report on Status of International Cybersecurity Standardization
  • 23. 3. IoT Security Standards “One of the major reasons the Internet+ is so insecure today is the absence of government oversight. Government is by far the most common way we improve our collective security, and it is almost certainly the most efficient.” -Bruce Schneier, Click Here to Kill Everyone
  • 24. 4: IoT Self-Authentication • PROBLEM: The technical process of authenticating the veracity of the IoT device and any data collected by the IoT device. • IMPACT: Limits utility to high-exposure IoT applications, due to economic cost. Attack surfaces remain due to high cost to implement broadly. 24
  • 25. 5: Data Integrity from IoT Sensors • PROBLEM: How do I know the data coming off the sensor data is accurate? There needs to be mechanisms to know data coming off sensors, drones, and other IoT data-generating devices is reliable for high-security applications. • IMPACT: Contamination or distortion of data from smart city sensors, lightweight devices that control utility grids or operations, and other cyber-physical systems could do serious real-world damage if an attack occurred and it took significant time to detect due to failed monitoring sensors. 25
  • 26. NPE AND THE SUPPLY CHAIN
  • 27. Digital Twins & Asset Passports 27
  • 28. • Digitization • Standards • Regulations Current Trends 28
  • 29. Shanzhai: Culture of Counterfeiting 1. Design nothing from scratch. 2. Buy low, sell high. 3. Innovate for speed & small scale savings. 4. Don’t make what you can buy for less. 5. Cash flow is king. 6. Don’t make it till you have a buyer. 7. There is no proprietary, only results. – IP takes up an invoice line item ($$), but there is no inventory in a factory for it. So why pay? 29
  • 30. • High level • Can be 20+ steps between Raw + Refine depending on suppliers and manufacturers • Data is collected and shared along the way • Consumption is the assumption (but there are always things left over) 30 Linear Supply Chain
  • 31. • High level • Can be 20+ steps between Raw + Refine depending on suppliers and manufacturers • Data is collected and shared along the way • Consumption is the assumption (but there are always things left over) 31 Linear Supply Chain
  • 32. • Different identifiers for up and downstream • Difficult to connect upstream to downstream • Increasing trend for transparency of upstream materials 32 Upstream/Downstream
  • 33. • A shifted view of the supply chain • Enabling recycling, reusing, and responsible disposal “We are going to run out of virgin materials at some point.” – Patagonia CEO 33 Circular Supply Chain
  • 34. Tracking Technology • Sensors o Tracking o RFID o QR Codes o IoT Devices • Distributed data structures • Data infrastructure 34
  • 35. Data & Identifiers • Linking Data • Data Governance • Data Harmonization • Data Aggregation 35
  • 36. Systemic Problems & Innovations Problems Innovations Many Jurisdictions Persistent Identifiers Industry Collaboration Data Interoperability Technology Interoperability Time for Adoption Economic Problems Shift Economic Incentives 36
  • 37. Quotes 37 “We spend a lot of time maintaining our corporate identity to ensure that no one’s stealing it.” —21 Century Customs Meeting “A cryptographically, verifiable, secure, physical identity, on a physical product that can be digitally validated that doesn’t intrude with product performance, or interfere in consumer privacy. This identity provides the benefits of supply chain efficiency, customer delight, post purchase engagement, warranty repair, replenishment, transfer of ownership, and lastly would support end of life.” —Interviewee “At some point in time, Chinese or Asian companies will become a source of creativity. This will be interesting for the European market development. At some point, they will realize that they are not [limited to] the Western bias.” —Interviewee
  • 38. Pockets of the Future in the Present 38
  • 39. Report recommendations 1. Persistent Identifiers 2. Identifier and Data Model Standards 3. Digital Twin 4. Data Portability & System Interoperability 5. Harmonize Global Regulations 6. Industry Collaboration 7. Activate the Private Sector 39
  • 41. The Vision: A Global Digital Rail • Technology standards for interoperability • Trans-National, goes beyond borders • Governments supported development of new infrastructure by private sector – Government of Canada – DHS investments • Citizens access Government services without being tracked or correlated • Identity issuance and verification • Digitally native identity and credentials • What else is possible? IoT??
  • 42. 3: Decentralized Identity Wallet ID Issuer ID Consumer (Verifier) Blockchain or Distributed Leger
  • 45. Interoperable standards to implement a common technology stack. • DID Spec • DID Methods • Universal Resolver • DID Auth • Verifiable Credentials Standards & Specs
  • 47. Current IoT Vulnerabilities – M3AAWG • Abuse, takeover • Sensor data, military and government applications • IoT built fast, lacks security, out of date quickly • But in the wild forever, sunsetting is rare • Other vulnerabilities like electronics components • Potential new vulns & other unintended consequences – We can’t necessarily predict what new vulns will be, but we know there will be new ones! So we need to have the mindset that this won’t be fixed forever.
  • 48. Designing for IoT identity • What can we borrow from human ID? Corporate ID? • What are new problems to consider? • Data sharing – machine to machine – machine to human – human to machine. • How is authentication, verifying, assigning, communicating, sharing, changing, delegation different – IoT to IoT world? – IoT to human world? – Human to human world?
  • 49. Future Identity System Goals • Manage a trillion identities – And all their relationships • Thrive in dynamic environment • Enable delegation – Between humans & NPEs • Involve automated systems • Solve current data, privacy problems • + Messaging • + Manage Abuse
  • 50. Why should we care? • Liability: who pays when something goes wrong? • Responsibility: who is responsible at a particular time? • Regulation: increasing trend for more regulation • Collaboration: rising trend to work together • Future Proof: envision the true scale of the problem
  • 51. Working together • Identity community mostly focused on human identity • Identity community hasn’t thought much about messaging or abuse • Industry 4.0 Vision • Sensors + Data (Supply Chain)
  • 52. Thank you Heather Vescent • www.thepurpletornado.com • heathervescent@gmail.com • vescent@thepurpletornado.com • @heathervescent Download NPE: bit.ly/NPEreport Download Supply Chain: bit.ly/GSCreport