Presentation is loading. Please wait.

Presentation is loading. Please wait.

Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon thebui@cisco.com // @shiftyourstory IoT Cloud Strategy.

Similar presentations


Presentation on theme: "Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon thebui@cisco.com // @shiftyourstory IoT Cloud Strategy."— Presentation transcript:

1 Securing the Internet of Things: Key Insights and Best Practices Across the Industry
Theresa Bui Revon IoT Cloud Strategy and Planning

2 IoT: The Risk and Rewards
IN THE NEWS November 25, 2016 November 3, 2016 November 1, 2016 November November

3 IoT Risk and Rewards Consumer Perspective Business Perspective

4 Vectors of an IoT attack

5 Kaspersky Tested Vulnerabilities: IoT in the home
IP Camera IP Camera Coffee Maker Vulnerable to god mode – full control over the camera via access to its firmware via insecure factory-set passwords. Password hijacking of local Wi-Fi network by exploiting weakness in communication between smartphone app and the device. Security Panel USB Dongle Rickrolling allows content on a victim’s screen to stream from a source owned by an attacker. All communications between the app and the system are routed through the vendor’s cloud service and everything is done over https and secured.

6 Securing IoT It Takes A Village Device Makers Standards Bodies
App Developers It Takes A Village S/W Security Enterprises Platforms Networks

7 Device Makers/App Developers: Authentication, user access controls, firmware updates, data encryption, security patches Enterprises: User access controls, security patches, data encryption Network Providers: Data encryption, deep packet inspection services to identify threats in the data generated by IoT services, DDoS attacks Platform Providers: Device-to-cloud security, AAA security (authentication, authorization, and accounting), session initiation protocols, data encryption, Software Security Providers: Malware protection, embedded certificates, code signing certificates, locking down the embedded software on devices Standards Bodies: Interoperability, communication and security protocols to protect device, data, enable attack awareness and security management

8 IoT Security Checklist
Evaluate the end-to-end identification and authentication of all entities involved in the IoT Service (i.e. gateways, endpoint devices, home network, roaming networks, service platforms) Ensure all user data shared between the endpoint device and back-end servers is encrypted All ‘personal’ and regulated data to be stored and used according to local privacy and data protection legislation Utilize an IoT connectivity management platform and establish rules- based security policies so immediate action can be taken if anomalous behaviour is detected from connected devices Take a holistic, network-level approach to security

9 Update on Cisco + Jasper

10 FOR DIGITAL YOUR FOUNDATION TRANSFORMATION
`Cisco is your foundation for digital transformation. Together with our partners, we provide the technology, the services, and the expertise to make it happen. For the last year years, you’ve depended on the network as the platform – but today’s business models require a new network – a network that delivers the capabilities required to be competitive in the digital era.

11 FOR DIGITAL IoT IS THE CATALYST TRANSFORMATION
`Cisco is your foundation for digital transformation. Together with our partners, we provide the technology, the services, and the expertise to make it happen. For the last year years, you’ve depended on the network as the platform – but today’s business models require a new network – a network that delivers the capabilities required to be competitive in the digital era.

12 6,700+ enterprises, 20+ industries, 100+ countries
Control Center KEY POINTS: So far more than 4,000 enterprise are enabled by the platform to make the product to service transition.

13 IoT is critical to Digital Transformation
Connect Everything. Transform Now. Deliver Insight Build & distribute connected things Build & run IoT applications Store & analyze data, machine learn Security Manage & monetize connected services Deliver data efficiently, cost-effectively & securely Cisco Jasper solves the problems associated with IoT data delivery and service management so that enterprises, service providers and ecosystem partners can rapidly & cost-effectively launch, manage and monetize IoT services on a global scale. Our Control Center connectivity management platform has already helped more than 5000 enterprises, including many of the worlds biggest brands, transform their business into a connected service business. We deliver this in partnership with 30 mobile operator groups worldwide, representing more than 120 service providers, and are integrated with leading solution providers such as Microsoft, SAP, VMware and more.

14 Cisco IoT Cloud Business Focus
Service Management Portfolio Build & distribute connected things Build & run IoT applications Store & analyze data, machine learn Security Manage & monetize connected services Data Delivery Portfolio Deliver data efficiently, cost-effectively & securely Cisco Jasper solves the problems associated with IoT data delivery and service management so that enterprises, service providers and ecosystem partners can rapidly & cost-effectively launch, manage and monetize IoT services on a global scale. Our Control Center connectivity management platform has already helped more than 5000 enterprises, including many of the worlds biggest brands, transform their business into a connected service business. We deliver this in partnership with 30 mobile operator groups worldwide, representing more than 120 service providers, and are integrated with leading solution providers such as Microsoft, SAP, VMware and more.

15 Cisco IoT Cloud Business Focus
Service Management Portfolio Build & distribute connected things Build & run IoT applications Store & analyze data, machine learn Security Manage & monetize connected services Data Delivery Portfolio Control Center Deliver data efficiently, cost-effectively & securely Cisco Jasper solves the problems associated with IoT data delivery and service management so that enterprises, service providers and ecosystem partners can rapidly & cost-effectively launch, manage and monetize IoT services on a global scale. Our Control Center connectivity management platform has already helped more than 5000 enterprises, including many of the worlds biggest brands, transform their business into a connected service business. We deliver this in partnership with 30 mobile operator groups worldwide, representing more than 120 service providers, and are integrated with leading solution providers such as Microsoft, SAP, VMware and more.

16 Catalyst Accelerates Market Leadership
Accelerate Market Leadership Expand Build Broaden Services Portfolio Pre-integrated vertical solutions partners Eco-system engagement services Solution best practices Launch Grow IoT Business Turnkey developer program Sales Engineering support Sales best practices Speed-up Commercial Introduction Sales scripts and solution demos Marketing templates and collateral Organizational best practices

17 Looking ahead

18

19 IoT Cloud – Solving the Data Delivery Problem
Data Endpoint Control Center Cloud Managed Gateway (coming soon) Manage connectivity: network provisioning, policy control, usage reporting, diagnostics… One centralized place to connect, control and manage all gateways & servers Security Security Parse out what should be handled locally, what should be sent to the cloud Edge Computing (Fog)

20 Industries Product Group - Delivering Outcomes
Connected Manufacturing Connected Spaces Connected Car Industry Specific Products Industry Validated Designs Smart Cities Health Care Sports & Entertainment

21


Download ppt "Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon thebui@cisco.com // @shiftyourstory IoT Cloud Strategy."

Similar presentations


Ads by Google