Hello, Today we will look at cyber security and the Internet of Things and how it could impact our business.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
MOBILE DEVICES & THEIR IMPACT IN THE ENTERPRISE Michael Balik Assistant Director of Technology Perkiomen Valley School District.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Network security policy: best practices
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Information Security Technological Security Implementation and Privacy Protection.
General Awareness Training
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Dell Connected Security Solutions Simplify & unify.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Powered by M2m methodology diagram Anything Anywhere Our specialist expertise and partnerships have enabled us to tailor smart monitoring solutions and.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Engineering Secure Software. Agenda  What is IoT?  Security implications of IoT  IoT Attack Surface Areas  IoT Testing Guidelines  Top IoT Vulnerabilities.
Reducing data loss by threats detection. InfoWatch Traffic Monitor & Workplace Security. Andrey Sokurenko Business Development Director.
Education – Partnership – Solutions Information Security Office of Budget and Finance Christopher Giles Governance Risk Compliance Specialist The Internet.
Welcome to the ICT Department Unit 3_5 Security Policies.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Surveillance and Security Systems Cyber Security Integration.
Security and resilience for Smart Hospitals Key findings
Verizon Intelligent Track and Trace: Serialization and Cold Chain
Principles Identified - UK DfT -
CS457 Introduction to Information Security Systems
Information Technology Acceptable Use An Overview
Phase 4: Manage Deployment
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Explaining strategies to ensure compliance with workplace legislation
3 Do you monitor for unauthorized intrusion activity?
New A.M. Best Cyber Questionnaire
East Carolina University
E&O Risk Management: Meeting the Challenge of Change
Design for Security Pepper.
Cybersecurity Policies & Procedures ICA
Lecture 14: Business Information Systems - ICT Security
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Internet of Things
Cloud Testing Shilpi Chugh.
How Cyber Security vulnerabilities will shape the future of Healthcare Sector Globally?
I have many checklists: how do I get started with cyber security?
Risks & Reality Cyber Security Risks & Reality
Reporting personal data breaches to the ICO
Internet of Things Vulnerabilities
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
INFORMATION SYSTEMS SECURITY and CONTROL
12 STEPS TO A GDPR AWARE NETWORK
Contact Center Security Strategies
Keeping your data, money & reputation safe
How to Mitigate the Consequences What are the Countermeasures?
3 Do you monitor for unauthorized intrusion activity?
Welcome to The World of Internet of Things
Capitalize on Your Business’s Technology
Mobile Commerce and Ubiquitous Computing
IoT: Privacy and Security
Internet of Things in logistics
3 Do you monitor for unauthorized intrusion activity?
Presentation transcript:

Hello, Today we will look at cyber security and the Internet of Things and how it could impact our business.

Agenda What is the Internet of Things? How does it work? What sectors use the IoT? IoT Business developments Risks to information security Risks to privacy Risks to safety IoT Security checklist We’ll cover the basics of the IoT, where it is being used across business sectors, and the possible risks it could place on our business. Finally, we will leave you with some security procedures and practices to follow to protect our business.

What is the Internet of Things? The Internet of Things (IoT) is a network of ‘smart’ devices that connect and communicate via the Internet. What is the Internet of Things? It’s a network of ‘smart’ devices that connect and communicate via the Internet. Smart devices are anything that connects to the Internet, from appliances to manufacturing equipment, from locks and security cameras to connected cars.

How does the IoT work? Smart devices collect and exchange information machine to machine (M2M) and with us. Remote control and monitoring Operate automatically through software, cameras and sensors Smart devices collect and exchange information with each other (machine to machine) and with us, through our personal IoT devices like our phones. These devices can be remotely controlled and monitored, but for the most part they operate automatically through software, cameras and sensors. Sensors detect things like light, sound, distance, movement, and much more.

The IoT is used in a variety of business sectors, from agriculture to healthcare to manufacturing.

What sectors use the IoT? Manufacturing Transportation Retail Science and Technology IT and Communications Education Healthcare Energy Construction Agriculture Manufacturing Transportation Retail Science and Technology IT and Communications Education Healthcare Energy Construction Agriculture

IoT business developments Retail Automated checkout Inventory and warehouse management The IoT may help the retail industry to cut costs and increase efficiencies with automated checkout, and inventory and warehouse management.

IoT business developments Manufacturing Operations efficiencies Asset management and maintenance The Industrial Internet of Things (IIoT) may help factories and manufacturing streamline operations and maintenance.

IoT business developments Consumers Entertainment Health and fitness For consumers, the IoT may offer new entertainment products and advancements in health and fitness.

IoT business developments Offices and Government Productivity and energy saving Security and surveillance Offices and governments may increase productivity, save energy, and enhance security and surveillance with the IoT.

IoT business developments Transportation Automation and traffic control Fleet management The IoT may transform the transportation industry with the efficiencies of connected, self-driving vehicles, traffic control and fleet management.

IoT business developments Healthcare Monitoring Automated administration of treatment The IoT may further advance healthcare with remote monitoring and automated administration of treatment.

Despite the possibilities of the IoT, the biggest impediment to businesses implementing IoT is security.

Risks to Information Security Possible consequences of an information breach: Loss of reputation/credibility Loss of revenue and time Lead to legal challenges An information breach caused by a cyber incident could have serious consequences to a business’s reputation and credibility, could cause a loss of revenue and time, and could lead to legal challenges.

Risks to Information Security Direct cyber incidents: Remote control and monitoring From head office, to supply chain, to customers Indirect cyber incidents (viral threats, malware): Downstream effects on IT security infrastructure A malware attack on the IoT device manufacturer could affect your IoT devices A direct cyber incident affects the targeted IoT device, and all other devices or networks that are connected to it, such as devices on the business network, or even our personal devices. An indirect cyber incident, such as malware, has downstream effects on a business’ IT infrastructure. For example, if the developer/manufacturer of IoT devices is affected by malware, any IoT devices from that manufacturer could be vulnerable to the same malware incident.

With every connection comes an increase in vulnerability With every connection comes an increase in vulnerability. IoT-related cyber incidents increase the risk of theft, exposure, or corruption of information.

Risks to Privacy Business, employee, and client information could be: Destroyed Altered Stolen and exposed Held for ransom If you do not control who and what connects to your network you cannot protect the information that traverses it. In a cyber incident, business, employee, and client information could be destroyed, altered, stolen and exposed, or even held for ransom.

Risks to Privacy Understand IoT device data collection policies: What information is gathered? How long is data kept? What is your data used for (marketing research, etc.)? IoT devices collect vast amounts of data, which creates concern over the confidentiality, privacy, and integrity of business data. Ensure to use IoT devices that provide transparency on their data collection policies. It is important to understand what information is being gathered, how long it is kept, and what it’s used for, such as marketing research or customer service.

The unauthorized control or remote takeover of an IoT device could cause physical damage to data and equipment, or even physical harm.

Risks to Safety IoT device malfunction or manipulation could cause: Physical damage to data Physical damage to equipment Physical harm For many devices, their operational roles can be far more important than the information they store. Imagine the consequences of a smart vehicle or insulin pump failing or being manipulated.

Risks to Safety Possible consequences of IoT device malfunction or manipulation: Costly repairs to systems, assets, and equipment Legal impact of harm to staff, customers or public Loss of reputation Damages could be costly to the business’s reputation and costly to recover systems, assets, and equipment. Also, consider the possible legal implications, and associated financial impact.

Before implementation: Research devices before you purchase. Read reviews and get recommendations; research their security capabilities. Have a point of contact with the manufacturers for any issues down the road. Read device materials: operator’s manuals, instructions, support forums. Create a Bring Your Own Device (BYOD) and IoT policies for employees. Assess against your existing IT security policies and standards. With the IoT’s impact on business security, it is important that all employees and parts of the business are aware of what we can do to protect our information. Slides 22 – 24: This checklist provides IT and management with tips to securely implement the IoT into our workplace.

During implementation: Secure your wireless network. Change device default usernames and passwords, and use strong passwords. Keep networks with sensitive information isolated. Consider using separate networks for IoT devices. Ensure the device has system reset capability in order to permanently eliminate sensitive configuration information. Control who can access your network and from where. Encrypt data, commands and communications, both at rest and in transit. Where possible, set operating system, software, and firmware to update automatically. Establish periodic manual updates as required. This checklist provides IT and management with tips to securely implement the IoT into our workplace.

After implementation: Implement a repeatable process to validate all safeguard and countermeasures in your implementation. Conduct ‘cyber incident’ tests and audits regularly to ensure the integrity of your network. Backup data regularly using secure and redundant storage solutions, such as multiple storage units and/or the cloud. Test your recovery process regularly. This checklist provides IT and management with a strategy to securely implement the IoT into our workplace.

Adhere to your company’s Bring Your Own Device/ IoT policy Understand what information is being collected by devices and why, before you download or buy. Use a lock screen password, use strong passwords. Backup data regularly on multiple storage units and the cloud. Connect only to secure Wi-Fi networks. Use safe websites, cloud storage, etc. For you, (the employees) IoT security is very similar to existing cyber security practices. Things like using strong passwords and lock screens, connecting to secure Wi-Fi networks and backing up data are simple measures to protect yourself and our business.

Resources If you want to learn more about the Internet of Things, visit GetCyberSafe.ca. Thank you.