Securing the Internet of Everything Why it is Really, Really Matters TALKING ABOUT MIST – WHAT THE CLOUD IS MADE OF JERRY L. ARCHER, CSO & FOUNDING BOARD.

Slides:



Advertisements
Similar presentations
Dawud Z. Roman Baton rouge chapter 7 th grade Black Data Processing Associates.
Advertisements

1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.
Microsoft A Vision for Health. Consumerism/ Choice A Challenging World Public Health Healthcare spend increasing as % of GDP spend Increasing social cost.
Qualcomm Demos Meeting of the Minds October 10, 2012.
THE STRATEGIC COUNCIL LEADERSHIP TRUST AND ENGAGEMENT NEW FUNDING SOURCES AND NEW DELIVERY VEHICLES Appendix 1 NEW FUNDING SERVOURCES AND NEW DELIVERY.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 8 04/11/2011 Security and Privacy in Cloud Computing.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 4 1 Chapter 12: Advanced Troubleshooting IT Essentials v5.0.
What’s Next What We believe Who We Are Cloud Computing Big data Mobility Social Enterprise.
Mi-Joung choi, Hong-Taek Ju, Hyun-Jun Cha, Sook-Hyang Kim and J
Cloud Computing, Server-side Rendering... and Video-games.
© 2010 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialC Smart+Connected Communities Bill Ruh, VP Solutions Technology Group March.
High Confidence Medical Device Software and Systems: A programming languages and tools perspective Mark P Jones Department of Computer Science & Electrical.
Copyright © Houghton Mifflin Company8-1 O.C. Ferrell University of New Mexico John Fraedrich University of Wyoming Linda Ferrell University of New Mexico.
Part of the BRE Trust Protecting People, Property and the Planet Smart Buildings and Security: Developing a unified approach Will Lloyd BRE Global Limited,
©Ian Sommerville 2006Critical Systems Slide 1 Critical Systems Engineering l Processes and techniques for developing critical systems.
Lecture 1.
Cyber Bullying BEAT BULLYING.
Riding the Mobile Gold Rush: Leveraging Cloud Data Across Multiple Mobile Platforms Bruno Terkaly Senior Developer Evangelist Microsoft Corporation
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 MAP Value Proposition.
Design for Engineering
© 2009 VMware Inc. All rights reserved Confidential VMware—Leading the New Era in IT Presenter Title, VMware.
Policy Governance® Lynn A. Walker, Ph.D. Boundary Management Consultants McKelvey Road St. Louis MO
Useful Techniques in Teaching Reading
ESCCO Data Security Training David Dixon September 2014.
INTERNET2 COLLABORATIVE INNOVATION PROGRAM DEVELOPMENT Florence D. Hudson Senior Vice President and Chief Innovation.
M2M Connecting Real-World Things with Cloud Computing T. Osawa 1IoT+Cloud.
Internet de las Cosas The Internet of Things (IoT) Internet der Dinge Internet des Objects.
CS Dept, City Univ.1 Internet of Things: Doubts and Reality Xiaohua Jia Dept. of Computer Science City University of Hong Kong.
Internet of things(IoT)
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 1 Slide 1 An Introduction to Software Engineering.
Finance: The Critical Link The Transportation – Land Use – Environment Connection Brian D. Taylor October 2003 Institute of Transportation Studies.
John Wilde President Strategic Alliances Welcome.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Smart Utility Operations Breaking down the barriers in your organization Mike Ballard.
0 © 2003 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID The Web of Meaning: The Business Value of the Semantic Web William Ruh.
What ’ s Next The X Internet. The Internet Killer Application – The Web More than 1 billion Web Pages 4 billion static Web pages (UC Berkeley) 600 billion.
Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. Empowering Smart Machines.
By: Anthony Tu.  Artificial intelligence is the intelligence exhibited by computers, machines or software.
CSCI1600: Embedded and Real Time Software Lecture 28: Verification I Steven Reiss, Fall 2015.
Information Systems in Organizations 4.3. New innovations: future trends in consumer systems Impact on individuals: Digital identity management.
Setting our Sites on the Cloud Carl Ford Co-Founder, Crossfire Media
Copyright © 2016 – Curt Hill The Digital World Understanding the challenges of this world.
The Internet of Things and Open Data: A Gateway to Smart Cities QITCOM 2012 Kingdom of Bahrain Dr. Julia Glidden 21c Consulting March 2012.
Sensors Sensors Everywhere! IoT by Wire – The New Relevance Rob Milks – CEO B-LineLogic, Inc.
COURSE DESCRIPTION: This course is designed to introduce the students to new and emerging technologies that are impacting the way we input information.
The Next Level Welcome Damien McCann
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
IoT R&I on IoT integration and platforms INTERNET OF THINGS
Second Congress The Business of Design and Engineering.
Eng. Martin Obuya President & Chairman Internet Society Kenya Chapter
Emerging Trends in Nuclear Information Management
Information Technology Acceptable Use An Overview
Security in Internet of Things Begins with the Data
The Future of the Internet
Launching Potentially Big Ideas
The Future of the Internet
Deep Shift: 21 Ways Software Will Transform Global Society
ASSET - Automotive Software cyber SEcuriTy
The Future of the Internet
IOT ppt
Frequently asked questions about software engineering
FinTech
CSCI1600: Embedded and Real Time Software
Using eSignature for Signing IBM Contracts
Artificial Intelligence Changes the Security Landscape
Your gateway to cloud innovation
CONNECTED FIELD SERVICE
Customer Service in a Virtual World
Online Learning.
Retail, a New Business Paradigm
The future of work Your day in 2024 TM.
Presentation transcript:

Securing the Internet of Everything Why it is Really, Really Matters TALKING ABOUT MIST – WHAT THE CLOUD IS MADE OF JERRY L. ARCHER, CSO & FOUNDING BOARD MEMBER CLOUD SECURITY ALLIANCE

Because your toilet will have all of your really personal data!

Because your car may be called to testify against you!

Because the airliner you will be flying in, is a connected Thing!

Because the Nuclear Power Plant nearby is a Thing.

Because it will drive human evolution!

And, because these Things will generate 19 trillion in revenue by John Chambers CISCO 50 Billion Connected Devices

What is needed? Redefinition of security boundaries Redefinition of security boundaries MIST is as much about action as it is data.. Security needs to reflect a new reality MIST is as much about action as it is data.. Security needs to reflect a new reality Elemental Security. The embedded applications must be self-defend – new coding techniques, testing methods. Elemental Security. The embedded applications must be self-defend – new coding techniques, testing methods. Containment – failures must be contained and acceptable. FMEA is a path to understanding. Containment – failures must be contained and acceptable. FMEA is a path to understanding. Trust can never be assumed. Every element must check the sanity of input before action. Trust can never be assumed. Every element must check the sanity of input before action. Tools for monitoring, blocking, etc. Tools for monitoring, blocking, etc. Radical Innovation – Game changers

The next 5-10 years. MIST Systems will know who we are and to have significant influence on our actions - perhaps in ways we won't understand. Even what we think. Government will leverage big data from all of the intelligent devices. The integration of technology and humans allowing us to choose who and what we are. Legal protections will be extended to systems, redefining data ownership? Significant diffusion of computing, resulting in disintermediation of traditional government and business models, creating diffuse accountability or attribution. No opt out...essential services only provided via the Net. When you get to a fork in the road take it!