Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon thebui@cisco.com // @shiftyourstory IoT Cloud Strategy.

Slides:



Advertisements
Similar presentations
Top of Content Box Line Subtitle Line Title Line Right Margin Line Wearables: Panacea or Pandora’s Box – A Security Perspective Gary Davis | Chief Consumer.
Advertisements

Peter Hajdu Cisco South East Europe February, 2015 Cisco: Quo Vadis?
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
1 MIKE MARCELLIN VP PRODUCT MARKETING. THE NEW NETWORK ENABLES CLOUD SERVICES, SECURITY, MOBILITY AND CONTENT DELIVERY NETWORKS.
Engineering Secure Software. Agenda  What is IoT?  Security implications of IoT  IoT Attack Surface Areas  IoT Testing Guidelines  Top IoT Vulnerabilities.
Education – Partnership – Solutions Information Security Office of Budget and Finance Christopher Giles Governance Risk Compliance Specialist The Internet.
1© 2015 IBM Corporation Unlocking the power of the API economy Client Briefing Nov.
Vodafone Business Cloud
©2015 Cisco and/or its affiliates. All rights reserved. Welcome… to the Digital Age Let’s make Amazing Happen Rick Huijbregts yes, on
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
The Derivitec Risk Portal Provides Powerful, Cost-Effective Risk Management Solutions, Powered by Azure, that Deploy in Minutes MICROSOFT AZURE ISV PROFILE:
SDN & NFV Driving Additional Value into Managed Services.
Grid Wide IoT Gateway Supports open standards and technologies, with open interfaces that provide support for proprietary gas-meter reading protocols and.
Connected Infrastructure
IoT Security Part 1, The Data
Device Maintenance and Management, Parental Control, and Theft Protection for Home Users Made Easy with Remo MORE and Power of Azure MICROSOFT AZURE APP.
What is it ? …all via a single, proven Platform-as-a-Service.
Digital Transformation for Modern Service Providers
Smart Building Solution
Infraestructura para Internet Industrial
Age of Digitization Internet of Things
of Analytics, WiFi and Experiences for Retailers
Top 10 Strategic Technology Trends for 2013
Parcel Tracking Solution Parcel Tracking What to look for Architecture
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Nicho Joins Microsoft Azure Certified Program to Transform Brand Engagement, Boost Customer Acquisition and Conversions with Scalable Ease MICROSOFT AZURE.
Hybrid Management and Security
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Ralleo Enterprise-Grade Solution for Managing Change and Business Transformation Provides Opportunities to Better Analyze Real-Time Data MICROSOFT AZURE.
Secure Software Confidentiality Integrity Data Security Authentication
Gather Valuable Customer Data
Dan Bieler, Principal Analyst
Trial.iO Makes it Easy to Provision Software Trials, Demos and Training Environments in the Azure Cloud in One Click, Without Any IT Involvement MICROSOFT.
Industrial IoT Derive business value from the Internet of Things, People and Services Ronald Binkofski General Manager Microsoft MC CIS.
Smart Building Solution
SMS+ on Microsoft Azure Provides Enhanced and Secure Text Messaging, with Audit Trail, Scalability, End-to-End Encryption, and Special Certifications MICROSOFT.
Wonderware Online Cost-Effective SaaS Solution Powered by the Microsoft Azure Cloud Platform Delivers Industrial Insights to Users and OEMs MICROSOFT AZURE.
Threat Management Gateway
Connected Infrastructure
How Smart Networks are Changing Corporate Networks
Hello, Today we will look at cyber security and the Internet of Things and how it could impact our business.
Stylelabs Develops the Marketing Content Hub to Offer Enterprises a High-End Marketing Content Management Platform Based on Microsoft Azure MICROSOFT AZURE.
BioCatch Fights Financial Fraud and Detects Online Threats via Behavioral Biometrics, All Powered by the Microsoft Azure Platform MICROSOFT AZURE TECH.
Speaker’s Name, SAP Month 00, 2017
Cloud DX Connected Health Kits Depend on Azure to Deliver Cloud Storage and Securely Host Data for its Remote Patient Monitoring MICROSOFT AZURE APP BUILDER.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fog Computing Market to grow at 65% CAGR from 2017 to 2024: Global Market.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Network Access Control Market trends research and projections for :
Determined Human Adversaries: Mitigations
Consulting Services for IoT
Internet of Things Vulnerabilities
Resco Mobile CRM Enables Sales Reps and Field Technicians to Access CRM Data Effortlessly While On the Go Across All Types of Mobile Devices WINDOWS APP.
Consulting Services for IoT
Partner Logo Reblaze Utilizes Microsoft Azure Cloud Technology to Provide Web Assets with a Comprehensive, Robust, Protective Shield Against Internet Threats.
Auth0 Is Identity Made Simple for Developers, Built by Developers and Supported by the High Availability and Performance of Microsoft Azure MICROSOFT AZURE.
Hosted on Microsoft Azure, Seismic is Drastically Changing How Enterprise Sales Teams Utilize Content to Accelerate Sales and Close Deals MICROSOFT AZURE.
DeFacto Planning on the Powerful Microsoft Azure Platform Puts the Power of Intelligent and Timely Planning at Any Business Manager’s Fingertips Partner.
MARMIND’s New Service Delivers a Single Centralized Marketing Plan That Connects Teams, Campaigns and Outcomes by Using the Power of the Azure Platform.
Top 10 Strategic Technology Trends for 2013
Securing the Threats of Tomorrow, Today.
Keep Your Digital Media Assets Safe and Save Time by Choosing ImageVault to be Your Digital Asset Management Solution, Hosted in Microsoft Azure Partner.
Media365 Portal by Ctrl365 is Powered by Azure and Enables Easy and Seamless Dissemination of Video for Enhanced B2C and B2B Communication MICROSOFT AZURE.
Secure once, run anywhere Simplify your security with Sophos
Spectrum Management in a Converged Ecosystem Velamah Cathapermal-Nair
Introduction to TransCelerate
DATS International Portfolio.
Intel Active Management Technology
Technology Convergence
Determined Human Adversaries: Mitigations
NFV and SD-WAN Multi vendor deployment
The Intelligent Enterprise and SAP Business One
Presentation transcript:

Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon thebui@cisco.com // @shiftyourstory IoT Cloud Strategy and Planning

IoT: The Risk and Rewards IN THE NEWS November 25, 2016 November 3, 2016 November 1, 2016 November 3 2016 November 16 2016

IoT Risk and Rewards Consumer Perspective Business Perspective

Vectors of an IoT attack

Kaspersky Tested Vulnerabilities: IoT in the home IP Camera IP Camera Coffee Maker Vulnerable to god mode – full control over the camera via access to its firmware via insecure factory-set passwords. Password hijacking of local Wi-Fi network by exploiting weakness in communication between smartphone app and the device. Security Panel USB Dongle Rickrolling allows content on a victim’s screen to stream from a source owned by an attacker. All communications between the app and the system are routed through the vendor’s cloud service and everything is done over https and secured.

Securing IoT It Takes A Village Device Makers Standards Bodies App Developers It Takes A Village S/W Security Enterprises Platforms Networks

Device Makers/App Developers: Authentication, user access controls, firmware updates, data encryption, security patches Enterprises: User access controls, security patches, data encryption Network Providers: Data encryption, deep packet inspection services to identify threats in the data generated by IoT services, DDoS attacks Platform Providers: Device-to-cloud security, AAA security (authentication, authorization, and accounting), session initiation protocols, data encryption, Software Security Providers: Malware protection, embedded certificates, code signing certificates, locking down the embedded software on devices Standards Bodies: Interoperability, communication and security protocols to protect device, data, enable attack awareness and security management

IoT Security Checklist Evaluate the end-to-end identification and authentication of all entities involved in the IoT Service (i.e. gateways, endpoint devices, home network, roaming networks, service platforms) Ensure all user data shared between the endpoint device and back-end servers is encrypted All ‘personal’ and regulated data to be stored and used according to local privacy and data protection legislation Utilize an IoT connectivity management platform and establish rules- based security policies so immediate action can be taken if anomalous behaviour is detected from connected devices Take a holistic, network-level approach to security

Update on Cisco + Jasper

FOR DIGITAL YOUR FOUNDATION TRANSFORMATION `Cisco is your foundation for digital transformation. Together with our partners, we provide the technology, the services, and the expertise to make it happen. For the last year years, you’ve depended on the network as the platform – but today’s business models require a new network – a network that delivers the capabilities required to be competitive in the digital era.

FOR DIGITAL IoT IS THE CATALYST TRANSFORMATION `Cisco is your foundation for digital transformation. Together with our partners, we provide the technology, the services, and the expertise to make it happen. For the last year years, you’ve depended on the network as the platform – but today’s business models require a new network – a network that delivers the capabilities required to be competitive in the digital era.

6,700+ enterprises, 20+ industries, 100+ countries Control Center KEY POINTS: So far more than 4,000 enterprise are enabled by the platform to make the product to service transition.

IoT is critical to Digital Transformation Connect Everything. Transform Now. Deliver Insight Build & distribute connected things Build & run IoT applications Store & analyze data, machine learn Security Manage & monetize connected services Deliver data efficiently, cost-effectively & securely Cisco Jasper solves the problems associated with IoT data delivery and service management so that enterprises, service providers and ecosystem partners can rapidly & cost-effectively launch, manage and monetize IoT services on a global scale. Our Control Center connectivity management platform has already helped more than 5000 enterprises, including many of the worlds biggest brands, transform their business into a connected service business. We deliver this in partnership with 30 mobile operator groups worldwide, representing more than 120 service providers, and are integrated with leading solution providers such as Microsoft, SAP, VMware and more.

Cisco IoT Cloud Business Focus Service Management Portfolio Build & distribute connected things Build & run IoT applications Store & analyze data, machine learn Security Manage & monetize connected services Data Delivery Portfolio Deliver data efficiently, cost-effectively & securely Cisco Jasper solves the problems associated with IoT data delivery and service management so that enterprises, service providers and ecosystem partners can rapidly & cost-effectively launch, manage and monetize IoT services on a global scale. Our Control Center connectivity management platform has already helped more than 5000 enterprises, including many of the worlds biggest brands, transform their business into a connected service business. We deliver this in partnership with 30 mobile operator groups worldwide, representing more than 120 service providers, and are integrated with leading solution providers such as Microsoft, SAP, VMware and more.

Cisco IoT Cloud Business Focus Service Management Portfolio Build & distribute connected things Build & run IoT applications Store & analyze data, machine learn Security Manage & monetize connected services Data Delivery Portfolio Control Center Deliver data efficiently, cost-effectively & securely Cisco Jasper solves the problems associated with IoT data delivery and service management so that enterprises, service providers and ecosystem partners can rapidly & cost-effectively launch, manage and monetize IoT services on a global scale. Our Control Center connectivity management platform has already helped more than 5000 enterprises, including many of the worlds biggest brands, transform their business into a connected service business. We deliver this in partnership with 30 mobile operator groups worldwide, representing more than 120 service providers, and are integrated with leading solution providers such as Microsoft, SAP, VMware and more.

Catalyst Accelerates Market Leadership Accelerate Market Leadership Expand Build Broaden Services Portfolio Pre-integrated vertical solutions partners Eco-system engagement services Solution best practices Launch Grow IoT Business Turnkey developer program Sales Engineering support Sales best practices Speed-up Commercial Introduction Sales scripts and solution demos Marketing templates and collateral Organizational best practices

Looking ahead

IoT Cloud – Solving the Data Delivery Problem Data Endpoint Control Center Cloud Managed Gateway (coming soon) Manage connectivity: network provisioning, policy control, usage reporting, diagnostics… One centralized place to connect, control and manage all gateways & servers Security Security Parse out what should be handled locally, what should be sent to the cloud Edge Computing (Fog)

Industries Product Group - Delivering Outcomes Connected Manufacturing Connected Spaces Connected Car Industry Specific Products Industry Validated Designs Smart Cities Health Care Sports & Entertainment