Download presentation
Presentation is loading. Please wait.
1
The Internet of Things Jay M Demmler
Graduate Student, Lyle School of Engineering
2
Introduction My name is Jay Demmler and I am a graduate student studying Systems Engineering at SMU here in Dallas Previously worked at Lockheed Martin and Dell Computers A special thanks to Mr. Ronald Salo for inviting me as well as Professor Jose Lineros from UNT for making introductions If you like my presentation you can learn more at UTD’s annual Fraud Conference
3
Playbook for the presentation
I may be an academic, but I understand that less is more in presentations We have a lot to cover but it should be fun and interesting We have time slotted for questions at the end I will be sending along additional source material and articles/videos if you are interested in learning more There will be a short quiz next week, so pay attention
4
So what is the Internet of Things?
The Internet of Things (IoT) is the connectivity of devices through electronics, software, sensors, and networks which allow for these objects to collect and sort data so that users or systems can take informed action.
5
If you only take one item from today…
“If you can measure it, you can manage it”
6
From this, to this, to this………
7
What is driving the usage of IoT
Several factors coming together make IoT possible and attractive for businesses and users today Ubiquitous internet access via wired, wireless, or cellular wireless Price of sensors has dropped significantly in recent years Common platforms for developers and manufacturers to build on (Microsoft, Android, iOS) Increased usage of standards and protocols by manufacturers and recognition and regulation of IoT by governing bodies (IEEE)
8
The biggest driver is…. ROI, businesses see a real financial benefit to becoming more efficient Lowering cost, reducing risk, and having more data to make informed decisions translate into fertile ground for businesses to integrate and invest in IoT
10
Quick look at three industries…
Agriculture Facilities Manufacturing/Logistics
11
Agriculture Have you ever met a connected cow?
12
Facilities Large commercial or industrial spaces
Monitoring and managing boilers, water systems, cold water chillers, HVAC, security, and more Monitoring and adjusting systems for the arrival and departure of people to areas or floors of buildings Increased data to the health and efficiency of building or plant systems
13
Manufacturing/Logistics
Mostly likely the deepest of the three areas in terms of time and investment in IoT RFID has a large amount of investment by heavy weights such as Wal-Mart and FedEx Whole manufacturing plants now outfitted with IoT to report usage, temperature, percentage available, and device status back to centralized command and control systems
14
Manufacturing/Logistics cont.
15
So what does this all mean to me???
Ground rule # 1 – technology will continue to move at high speed and today’s prediction may not be tomorrow’s reality Ground rule # 2 – we will be behind the curve as processes, procedures, regulations, best practice, and governance will sit in committees and debate arenas as technology continues to move forward
16
Areas of Focus Security Auditing Health and Safety Shadow IT
Ethical Considerations
17
Security Defining security and best practice should be separated into two general camps PCI, PII, & PHI Everything else Existing regulatory frameworks still apply to IoT Some data may be so trivial as to not warrant consideration End point and collection point should be treated separately
18
Auditing Existing audit types such as SOC2 and PCI compliance are behind the IoT curve While some functions of audits remain the same as the collection method is irrelevant Emerging types of IoT may not fit neatly into established frameworks Brings up ethical as well as bioethical considerations
19
Health and Safety IoT systems have the ability to significantly alter health and safety as automation and monitoring can be part of facility, security, and the health arenas Monitoring, managing, and restricting access are key to preserving the safety of populations Continuous best practice and security screenings need to be followed to reduce risk
20
Shadow IT Shadow IT has become a part of many organizations as business units or functions can now easily and quickly gain access to cloud based or As-A-Service systems This extends to the IoT arena as departments traditionally not associated with IT may be utilizing vendors or services that they are unaware need to be included in audits Identifying or classifying these services may be difficult as they exist outside of known channels
21
Ethical Considerations
Collecting, storing, and using data including data about individual users posses some interesting dilemas Data can be collected without the knowledge or consent of individuals Healthcare and financial data are still controversial subjects and the need for debate is still there How does anonymity come into play?
22
Best practices Acknowledgement that IoT will be part of business going forward in many different ways Acknowledgement that this field is evolving and will continue to do so Inclusive views of stakeholders to include corporate, contractor, vendor, and service providers Flexibility to classify and categorize IoT into existing frameworks
23
Best practices Creativity to adapt existing frameworks to fit IoT
Continuous improvement in your organization or governing bodies best practice and procedures around IoT Creation of groups or like minded individuals to continue the debate and move the industry forward
24
Jay Demmler jdemmler@smu.edu
Thank you and Contact Info Jay Demmler 2016 UTD Fraud Conference in Richardson for my presentation on advanced security for IoT
25
Q & A
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.