SlideShare a Scribd company logo
1 of 32
Download to read offline
Cybersecurity and mobility in the
Energy Industry
Advanced Energy 2013
1 May 2013
Christian Glover Wilson"
Vice President, Technology & Strategy"
Tigerspike
Cybersecurity and mobility in the Energy Industry
Abstract
Enterprise mobility has progressed from email on a BlackBerry to a vast
proliferation of personal media devices in the hands of employees, engineers
and the end consumers. Mobility is key to how remote teams now collaborate
and access files and data with the advent of cloud computing accelerating that
further. The distributed nature of energy production and distribution make this
even more pronounced for the energy industry. 

This new ecosystem has led to a variety of new cybersecurity threats that need
to be understood and prevented. The widespread adoption of smart devices
and the rise of the Internet of Things need to be secured with a combination of
best practice and technology – protecting but not limiting the continuous push
towards anywhere and any device productivity.
Rise of Mobility
Understanding the Threats
Addressing the Problem
Cybersecurity and mobility in the Energy Industry
Contents
Cybersecurity and mobility in the Energy Industry
Rise of Mobility
Proliferation of Personal Technology Devices
Cybersecurity and mobility in the Energy Industry
•  As of late 2010, smartphone sales started surpassing those
of traditional computers. 
•  “By 2015 shipments of tablets will outstrip those of
conventional PCs such as desktops and notebooks”-Gartner
Source: Gartner, April 2013
Proliferation of Personal Technology Devices
Cybersecurity and mobility in the Energy Industry
•  Tablets will overtake desktop and notebook shipments combined,
while 'ultra-mobiles' will grow
•  Shift in device preference is coming from a shift in user behavior
•  Leads to a bigger embrace of the cloud for sharing and for access
to content
Source: Gartner, April 2013
Enterprise Mobility
Cybersecurity and mobility in the Energy Industry
•  Rapidly growing adoption of BYOD
•  Easy to push real-time alerts and crucial messages to
users, based on location
•  Can capture vital analytics about usage and devices
used
•  Enterprise apps can provide offline access to keep
using the app and entering data, with an automatic
sync once the device comes back into range
Enterprise Mobility
Cybersecurity and mobility in the Energy Industry
Mobile devices empower employees to do what they need to do — whenever
and wherever; enterprise mobility is not telecommuting.






A rapidly maturing ecosystem of mobile app tools, technologies and platforms.
Internet of Things
Cybersecurity and mobility in the Energy Industry
•  Growing network of IP-enabled components
and appliances
•  Meters and devices reporting their usage
allowing reactive modeling 
•  Locks and control devices controlled over
the Internet
•  Connected installations managed remotely
Internet of Things
Cybersecurity and mobility in the Energy Industry
Supply/Demand	
   Alterna1ve	
   Oil/Gas	
  
Loca%ons	
   Power	
  Genera%on,	
  
Transmission	
  and	
  Distribu%on	
  
Low	
  Voltage	
  
Power	
  Quality	
  
Energy	
  Management	
  
Solar	
  
Wind	
  
Co-­‐genera%on	
  
Electrochemical	
  
Rigs	
  
Derricks	
  
Well	
  Heads	
  
Pumps	
  	
  
Pipelines	
  
Devices	
   Turbines,	
  Windmills,	
  UPS,	
  BaJeries,	
  Generators,	
  Meters,	
  Drills,	
  Fuel	
  Cells,	
  etc.	
  
Every industry has an individual set of uniquely
identified “things” generating data and able to
controlled remotely. 
For example:
The mobile world changes with every new device and set of
devices. 

Smartphones and tablets are being joined in the marketplace
by new consumer devices.

Wearable and augmented reality products will fast become
widespread.
New Devices
Cybersecurity and mobility in the Energy Industry
Mobile device uses
Cybersecurity and mobility in the Energy Industry
•  Voice
•  Video
•  Data
•  Control
•  NFC Interaction (RFID, Bluetooth, etc)
•  Thin client for cloud-stored data
•  BigData aggregation visualization
Cybersecurity and mobility in the Energy Industry
Understanding the Threats
The Device
Cybersecurity and mobility in the Energy Industry
•  Vulnerable to malware, malicious apps posing as benign apps
•  Legitimate apps can allow data loss and data leakage if poorly-
written 
•  Vulnerabilities in Hardware, OS, Application and Third-Party
Applications
•  Unsecured or Rogue Marketplaces
The Device
Cybersecurity and mobility in the Energy Industry
•  Malware and attacks on mobile devices are on the rise
•  Vulnerabilities found almost as soon as a device hits the market
Accidental breaches and device loss
Cybersecurity and mobility in the Energy Industry
•  68% of employees reported that they did not have their devices
cleaned when upgrading
•  Access and data breaches are the most common results of lost
phones... not recovery
•  Social engineering tactics lead users to click malicious URLs
spammed by trusted sources via SMS, social media and email.
BYOD – Statistics around usage
Cybersecurity and mobility in the Energy Industry
0%	
   10%	
   20%	
   30%	
   40%	
   50%	
   60%	
   70%	
   80%	
   90%	
  
...user a personal electronic device for work-related functions
...who use a laptop for work will connect to the company's
network via a free or public WiFi connection
...who use a personal device for work have let someone else
use it
...who use personal device(s) for work have not activated the
auto-lock feature
...who use their personal device for work admit that their
organization's data and/or files are not encrypted
...who use a personal device for work say their organization
has not implemented a "bring-your-own-device" policy
...of employees U.S. adults have been a victim of malware or
hacking on a personal electronic device
81%
31%
46%
37%
33%
66%
25%
Encryption of DAR and signal 
Cybersecurity and mobility in the Energy Industry
•  Given sufficient time, a brute force attack is capable of cracking
any known serial encryption algorithm.
•  To crack AES with 128-bit key would take 1 billion billion years
for a supercomputer of today.
•  Using quantum technology with the same throughput,
exhausting the possibilities of a 128-bit AES key would take
about six months
•  Encryption only ever as secure as the implementation
Connectivity weakness
Cybersecurity and mobility in the Energy Industry
•  Unsecured WiFi and rogue access points add vulnerability
•  NFC/RFID has a low threat of breach but can allow mimicry
•  Bluetooth defects allow "
eavesdropping and caller "
identification
Mobility introduces all these threats
Cybersecurity and mobility in the Energy Industry
Internet of Things
Cybersecurity and mobility in the Energy Industry
•  Increases exponentially the quantity of
systems that will have to be protected
•  Route of data to the provider is obvious
weakness
•  Multiple points of failure
•  DDoS attacks on individual appliances
•  Introduce vulnerability to associated financial
records
Wearable
Cybersecurity and mobility in the Energy Industry
New devices means new threats and fresh
cyber security considerations
Cybersecurity and mobility in the Energy Industry
Wearable
Cybersecurity and mobility in the Energy Industry
Addressing the Problem
Cybersecurity and mobility in the Energy Industry
Securing the Device
Securing the Device
Cybersecurity and mobility in the Energy Industry
•  MDM
Notification, access control, quarantine, selective wipe
•  MAM
Authentication, storage control, copy/paste limitation
•  Data and apps
•  Event monitoring
•  Keep OS updated
People are demanding to use their own
gadgets in their jobs. Trying to thwart
them is futile
The Economist
92% of Fortune 500
companies are testing or deploying
the iPad 
Tim Cook, CEO Apple
When young employees first come
across business-application screens,
they scream in horror 
Willem Eelman, CIO Unilever

Enterprise Mobility
Cybersecurity and mobility in the Energy Industry
Enterprise Mobility
Cybersecurity and mobility in the Energy Industry
•  BYOD vs COPE (Corporate owned,
personally enabled)
•  Clear policy required
•  Control non-work device use
Encryption
•  Invest in parallel solutions, be prepared for
Quantum Computing
•  Encrypt data stored to cloud storage
•  Encrypt any sensitive data stored on the device
as well as while being transmitted
•  Pay attention to key exchange
•  Harden networks
Cybersecurity and mobility in the Energy Industry
Internet of Things
Cybersecurity and mobility in the Energy Industry
•  Assume each device or appliance is the weakest part of
the system
•  Protect data captured even if it caches on the device or
local network
•  Consider remote control locks as insecure as those
operated locally
•  Have lock passwords change"
frequently and on demand to"
allow temporary access
Securing mobile devices
Cybersecurity and mobility in the Energy Industry
Christian Glover Wilson

Vice President, Technology & Strategy"
christian.gloverwilson@tigerspike.com
+1 917 310 5249
"

San Francisco
875 Howard Street"
6th Floor"
San Francisco, CA 94103"
+1 415 562 4001"
sanfrancisco@tigerspike.com
New York
133 W 19th St"
7th Floor"
New York, NY 10011"
+1 646 330 4636"
newyork@tigerspike.com
Contact me
San Francisco New York London Dubai Singapore Sydney Melbourne

More Related Content

What's hot

All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Adam Thierer
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkClearnetwork
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesProofpoint
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015Hildebrand Technology
 
Chapter-2.docx
Chapter-2.docxChapter-2.docx
Chapter-2.docxAmir Khan
 
Internet of Things and Security challenges
Internet of Things and Security challengesInternet of Things and Security challenges
Internet of Things and Security challengesAnastasios Economides
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principlesardexateam
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security ElementsEurotech
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)SecPod Technologies
 
Securing Internet of Things
Securing Internet of ThingsSecuring Internet of Things
Securing Internet of ThingsRishabh Sharma
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the EnterpriseDaniel Miessler
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks Abaram Network Solutions
 
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
SMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  OpportunitiesSMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  Opportunities
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities Tauseef Naquishbandi
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.Spiceworks Ziff Davis
 

What's hot (20)

All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015
 
Chapter-2.docx
Chapter-2.docxChapter-2.docx
Chapter-2.docx
 
Internet of Things(IOT)
Internet of Things(IOT)Internet of Things(IOT)
Internet of Things(IOT)
 
Internet of Things and Security challenges
Internet of Things and Security challengesInternet of Things and Security challenges
Internet of Things and Security challenges
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)
 
M2M_IoT_Presentation
M2M_IoT_PresentationM2M_IoT_Presentation
M2M_IoT_Presentation
 
Securing Internet of Things
Securing Internet of ThingsSecuring Internet of Things
Securing Internet of Things
 
Blueprint for the Industrial Internet of Things
Blueprint for the Industrial Internet of ThingsBlueprint for the Industrial Internet of Things
Blueprint for the Industrial Internet of Things
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the Enterprise
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks
 
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
SMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  OpportunitiesSMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  Opportunities
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.
 

Similar to Tigerspike - Cybersecurity and Mobility in the Energy Industry

Fog computing
Fog computingFog computing
Fog computingAnkit_ap
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfezzAyman1
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar PresentationCertrec
 
Speaking at John Carrol University on the Internet of Things
Speaking at John Carrol University on the Internet of ThingsSpeaking at John Carrol University on the Internet of Things
Speaking at John Carrol University on the Internet of ThingsJustin Grammens
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing  A Case StudyAuthentication And Authorization Issues In Mobile Cloud Computing  A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case StudyAngie Miller
 
Assign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptxAssign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptxpdevang
 
Getting More Value Out of Your Data
Getting More Value Out of Your DataGetting More Value Out of Your Data
Getting More Value Out of Your DataInnoTech
 
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...TI Safe
 
The Benefits of Digitizing Manufacturing
The Benefits of Digitizing ManufacturingThe Benefits of Digitizing Manufacturing
The Benefits of Digitizing ManufacturingChristopher Kelley
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdfKARANSINGHD
 
Information Security, Cybercrime and technology futures allowing you to get a...
Information Security, Cybercrime and technology futures allowing you to get a...Information Security, Cybercrime and technology futures allowing you to get a...
Information Security, Cybercrime and technology futures allowing you to get a...Insight UK
 
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014Adrian Wright
 

Similar to Tigerspike - Cybersecurity and Mobility in the Energy Industry (20)

IAM for mobile and BYOD
IAM for mobile and BYODIAM for mobile and BYOD
IAM for mobile and BYOD
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Fog computing
Fog computingFog computing
Fog computing
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar Presentation
 
Speaking at John Carrol University on the Internet of Things
Speaking at John Carrol University on the Internet of ThingsSpeaking at John Carrol University on the Internet of Things
Speaking at John Carrol University on the Internet of Things
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing  A Case StudyAuthentication And Authorization Issues In Mobile Cloud Computing  A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
 
Assign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptxAssign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptx
 
Getting More Value Out of Your Data
Getting More Value Out of Your DataGetting More Value Out of Your Data
Getting More Value Out of Your Data
 
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
 
The Benefits of Digitizing Manufacturing
The Benefits of Digitizing ManufacturingThe Benefits of Digitizing Manufacturing
The Benefits of Digitizing Manufacturing
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
Internet of Things (IoT
Internet of Things (IoTInternet of Things (IoT
Internet of Things (IoT
 
Information Security, Cybercrime and technology futures allowing you to get a...
Information Security, Cybercrime and technology futures allowing you to get a...Information Security, Cybercrime and technology futures allowing you to get a...
Information Security, Cybercrime and technology futures allowing you to get a...
 
CHA_001_IOT.pptx
CHA_001_IOT.pptxCHA_001_IOT.pptx
CHA_001_IOT.pptx
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
 

More from Christian Glover Wilson (8)

2016 Trends in Mobility
2016 Trends in Mobility2016 Trends in Mobility
2016 Trends in Mobility
 
Frictionless + on demand
Frictionless + on demandFrictionless + on demand
Frictionless + on demand
 
iOS7
iOS7iOS7
iOS7
 
Responsive web design
Responsive web designResponsive web design
Responsive web design
 
iBeacon introduction and overview
iBeacon introduction and overviewiBeacon introduction and overview
iBeacon introduction and overview
 
Responsive web design and eCommerce
Responsive web design and eCommerceResponsive web design and eCommerce
Responsive web design and eCommerce
 
Rapid prototyping and sketching
Rapid prototyping and sketchingRapid prototyping and sketching
Rapid prototyping and sketching
 
Push to Engage
Push to EngagePush to Engage
Push to Engage
 

Recently uploaded

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Tigerspike - Cybersecurity and Mobility in the Energy Industry

  • 1. Cybersecurity and mobility in the Energy Industry Advanced Energy 2013 1 May 2013 Christian Glover Wilson" Vice President, Technology & Strategy" Tigerspike
  • 2. Cybersecurity and mobility in the Energy Industry Abstract Enterprise mobility has progressed from email on a BlackBerry to a vast proliferation of personal media devices in the hands of employees, engineers and the end consumers. Mobility is key to how remote teams now collaborate and access files and data with the advent of cloud computing accelerating that further. The distributed nature of energy production and distribution make this even more pronounced for the energy industry. This new ecosystem has led to a variety of new cybersecurity threats that need to be understood and prevented. The widespread adoption of smart devices and the rise of the Internet of Things need to be secured with a combination of best practice and technology – protecting but not limiting the continuous push towards anywhere and any device productivity.
  • 3. Rise of Mobility Understanding the Threats Addressing the Problem Cybersecurity and mobility in the Energy Industry Contents
  • 4. Cybersecurity and mobility in the Energy Industry Rise of Mobility
  • 5. Proliferation of Personal Technology Devices Cybersecurity and mobility in the Energy Industry •  As of late 2010, smartphone sales started surpassing those of traditional computers. •  “By 2015 shipments of tablets will outstrip those of conventional PCs such as desktops and notebooks”-Gartner Source: Gartner, April 2013
  • 6. Proliferation of Personal Technology Devices Cybersecurity and mobility in the Energy Industry •  Tablets will overtake desktop and notebook shipments combined, while 'ultra-mobiles' will grow •  Shift in device preference is coming from a shift in user behavior •  Leads to a bigger embrace of the cloud for sharing and for access to content Source: Gartner, April 2013
  • 7. Enterprise Mobility Cybersecurity and mobility in the Energy Industry •  Rapidly growing adoption of BYOD •  Easy to push real-time alerts and crucial messages to users, based on location •  Can capture vital analytics about usage and devices used •  Enterprise apps can provide offline access to keep using the app and entering data, with an automatic sync once the device comes back into range
  • 8. Enterprise Mobility Cybersecurity and mobility in the Energy Industry Mobile devices empower employees to do what they need to do — whenever and wherever; enterprise mobility is not telecommuting. A rapidly maturing ecosystem of mobile app tools, technologies and platforms.
  • 9. Internet of Things Cybersecurity and mobility in the Energy Industry •  Growing network of IP-enabled components and appliances •  Meters and devices reporting their usage allowing reactive modeling •  Locks and control devices controlled over the Internet •  Connected installations managed remotely
  • 10. Internet of Things Cybersecurity and mobility in the Energy Industry Supply/Demand   Alterna1ve   Oil/Gas   Loca%ons   Power  Genera%on,   Transmission  and  Distribu%on   Low  Voltage   Power  Quality   Energy  Management   Solar   Wind   Co-­‐genera%on   Electrochemical   Rigs   Derricks   Well  Heads   Pumps     Pipelines   Devices   Turbines,  Windmills,  UPS,  BaJeries,  Generators,  Meters,  Drills,  Fuel  Cells,  etc.   Every industry has an individual set of uniquely identified “things” generating data and able to controlled remotely. For example:
  • 11. The mobile world changes with every new device and set of devices. Smartphones and tablets are being joined in the marketplace by new consumer devices. Wearable and augmented reality products will fast become widespread. New Devices Cybersecurity and mobility in the Energy Industry
  • 12. Mobile device uses Cybersecurity and mobility in the Energy Industry •  Voice •  Video •  Data •  Control •  NFC Interaction (RFID, Bluetooth, etc) •  Thin client for cloud-stored data •  BigData aggregation visualization
  • 13. Cybersecurity and mobility in the Energy Industry Understanding the Threats
  • 14. The Device Cybersecurity and mobility in the Energy Industry •  Vulnerable to malware, malicious apps posing as benign apps •  Legitimate apps can allow data loss and data leakage if poorly- written •  Vulnerabilities in Hardware, OS, Application and Third-Party Applications •  Unsecured or Rogue Marketplaces
  • 15. The Device Cybersecurity and mobility in the Energy Industry •  Malware and attacks on mobile devices are on the rise •  Vulnerabilities found almost as soon as a device hits the market
  • 16. Accidental breaches and device loss Cybersecurity and mobility in the Energy Industry •  68% of employees reported that they did not have their devices cleaned when upgrading •  Access and data breaches are the most common results of lost phones... not recovery •  Social engineering tactics lead users to click malicious URLs spammed by trusted sources via SMS, social media and email.
  • 17. BYOD – Statistics around usage Cybersecurity and mobility in the Energy Industry 0%   10%   20%   30%   40%   50%   60%   70%   80%   90%   ...user a personal electronic device for work-related functions ...who use a laptop for work will connect to the company's network via a free or public WiFi connection ...who use a personal device for work have let someone else use it ...who use personal device(s) for work have not activated the auto-lock feature ...who use their personal device for work admit that their organization's data and/or files are not encrypted ...who use a personal device for work say their organization has not implemented a "bring-your-own-device" policy ...of employees U.S. adults have been a victim of malware or hacking on a personal electronic device 81% 31% 46% 37% 33% 66% 25%
  • 18. Encryption of DAR and signal Cybersecurity and mobility in the Energy Industry •  Given sufficient time, a brute force attack is capable of cracking any known serial encryption algorithm. •  To crack AES with 128-bit key would take 1 billion billion years for a supercomputer of today. •  Using quantum technology with the same throughput, exhausting the possibilities of a 128-bit AES key would take about six months •  Encryption only ever as secure as the implementation
  • 19. Connectivity weakness Cybersecurity and mobility in the Energy Industry •  Unsecured WiFi and rogue access points add vulnerability •  NFC/RFID has a low threat of breach but can allow mimicry •  Bluetooth defects allow " eavesdropping and caller " identification
  • 20. Mobility introduces all these threats Cybersecurity and mobility in the Energy Industry
  • 21. Internet of Things Cybersecurity and mobility in the Energy Industry •  Increases exponentially the quantity of systems that will have to be protected •  Route of data to the provider is obvious weakness •  Multiple points of failure •  DDoS attacks on individual appliances •  Introduce vulnerability to associated financial records
  • 22. Wearable Cybersecurity and mobility in the Energy Industry New devices means new threats and fresh cyber security considerations
  • 23. Cybersecurity and mobility in the Energy Industry Wearable
  • 24. Cybersecurity and mobility in the Energy Industry Addressing the Problem
  • 25. Cybersecurity and mobility in the Energy Industry Securing the Device
  • 26. Securing the Device Cybersecurity and mobility in the Energy Industry •  MDM Notification, access control, quarantine, selective wipe •  MAM Authentication, storage control, copy/paste limitation •  Data and apps •  Event monitoring •  Keep OS updated
  • 27. People are demanding to use their own gadgets in their jobs. Trying to thwart them is futile The Economist 92% of Fortune 500 companies are testing or deploying the iPad Tim Cook, CEO Apple When young employees first come across business-application screens, they scream in horror Willem Eelman, CIO Unilever Enterprise Mobility Cybersecurity and mobility in the Energy Industry
  • 28. Enterprise Mobility Cybersecurity and mobility in the Energy Industry •  BYOD vs COPE (Corporate owned, personally enabled) •  Clear policy required •  Control non-work device use
  • 29. Encryption •  Invest in parallel solutions, be prepared for Quantum Computing •  Encrypt data stored to cloud storage •  Encrypt any sensitive data stored on the device as well as while being transmitted •  Pay attention to key exchange •  Harden networks Cybersecurity and mobility in the Energy Industry
  • 30. Internet of Things Cybersecurity and mobility in the Energy Industry •  Assume each device or appliance is the weakest part of the system •  Protect data captured even if it caches on the device or local network •  Consider remote control locks as insecure as those operated locally •  Have lock passwords change" frequently and on demand to" allow temporary access
  • 31. Securing mobile devices Cybersecurity and mobility in the Energy Industry
  • 32. Christian Glover Wilson
 Vice President, Technology & Strategy" christian.gloverwilson@tigerspike.com +1 917 310 5249 " San Francisco 875 Howard Street" 6th Floor" San Francisco, CA 94103" +1 415 562 4001" sanfrancisco@tigerspike.com New York 133 W 19th St" 7th Floor" New York, NY 10011" +1 646 330 4636" newyork@tigerspike.com Contact me San Francisco New York London Dubai Singapore Sydney Melbourne