SlideShare a Scribd company logo
1 of 13
Managing the security challenges
presented by OTT
Monetising OTT
London March 26th 2015
Ben Schwarz - bs@ctoic.net
Workshop agenda
Security concerns may be considered ‘old hat’ to telecoms
operators, we’ve always had them!
However, the age of IoT and OTT delivery has changed this. In
this workshop we will discuss YOUR OTT security concerns,
and work to try and solve these, whilst also:
– Identifying the drivers of concern amongst both operators and
consumers of OTT security – is it all about privacy?
– Determining to what extent security can delight customers in
the age of IoT, despite the fact that early DRM systems were
considered a hindrance
– Establishing whether analytics can and should be run through
the security system
– Debating whether security should be connected, as OTT services
are
Ben Schwarz - bs@ctoic.net
Some security challenges
• Speed up provisioning
• Increase agility to adapt to new threats
• Develop and maintain ever deeper expertise
• Improve Cost effectiveness
• Don’t miss the Analytics boat
• Adapt security to evolving risk level (inc.
during a single session)
Ben Schwarz - bs@ctoic.net
DRM at the turn of the century
Ben Schwarz - bs@ctoic.net
But DRM must also be …
• About making users’ lives easier
– Addressing privacy concerns
– Facilitating sharing, testing/tasting
• For managing & promoting Digital Rights
– The original goal of DRM
• Connected
– experience continuity, adaptability
• Security domains are merging
– E.g. pay TV and Smart Home, …
Ben Schwarz - bs@ctoic.net
So what is Security?
• It depends who you ask:
– Authentication, Authorization, Rights management
– Deterrent, preventive, detective, corrective
– Encryption & protection?
– Emergency response? Processes ?
• Security / identity / Privacy
– Why is there still a plethora of password management
companies out there?
• Despite SSO, authentication still needs work and Identity
theft still righty scares people
Ben Schwarz - bs@ctoic.net
Physical
Conceptual
Contextual
Logical
Component
An IT Architects view on security
Ben Schwarz - bs@ctoic.net
Physical or Virtual
Cloud
Component
A pragmatist pay TV view
Ben Schwarz - bs@ctoic.net
Server
infrastructure
Content
creation
Distribution /
broadcast
Service
consumption
Content
Storage
So where does security come in for
OTT delivery of pay TV
Ben Schwarz - bs@ctoic.net
Security
domain 1
Security
domain 2
Security
domain 3
Security
domain 4
Security and product lifecycles
Design Build TestSpecify
Establish
security
requirements
Identify
Key
threats
Remove
unsafe
features
Analyze risk
vs.
security
Incident
response
plan
Training
Run
Ben Schwarz - bs@ctoic.net
Real-world and digital resources
Content
security
Authorization
Authentication
Analytics
Rights
management
Ben Schwarz - bs@ctoic.net
Content
security
Authorization
Analytics
Rights
management
Authentication
1
4
Start
VoD
session
2
…
6
5
3
Content
store
Big data
Analytics
Fully in-
house
Fully outsourced
In-house &/or outsourced
Entitlements
database
Subscriber
managemen
t system
Abstraction layer
The importance of an abstraction layer
Components can
be delocalized as
required
Ben Schwarz - bs@ctoic.net
Does OTT change risk?
• In an OTT environment, the content
protection risks themselves are similar, only
the impact of a breach can be greater.
• When operator aggregates an OTT service
through their controlled infrastructure (e.g.
Netflix) the aggregator carrier little or no risk.
• Whether OTT or not the risk on user data has
much longer-term impact than the risk on
content.
Ben Schwarz - bs@ctoic.net

More Related Content

What's hot

Ericsson Technology Review - Issue1 2015
Ericsson Technology Review - Issue1 2015Ericsson Technology Review - Issue1 2015
Ericsson Technology Review - Issue1 2015Ericsson
 
The path to 5G mobile networks
The path to 5G mobile networksThe path to 5G mobile networks
The path to 5G mobile networksBearingPoint
 
Accelerating IoT
Accelerating IoTAccelerating IoT
Accelerating IoTEricsson
 
Connected Vineyards
Connected VineyardsConnected Vineyards
Connected VineyardsEricsson
 
5G – How to enable change-makers in the Networked Society
5G – How to enable change-makers in the Networked Society5G – How to enable change-makers in the Networked Society
5G – How to enable change-makers in the Networked SocietyEricsson Latin America
 
Digiturk_TV_Connect_2015
Digiturk_TV_Connect_2015Digiturk_TV_Connect_2015
Digiturk_TV_Connect_2015Ozgur Ertem
 
Ericsson 5g services infographic
Ericsson 5g services infographicEricsson 5g services infographic
Ericsson 5g services infographicEricsson
 
Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016Ericsson
 
Accelerated network build
Accelerated network build Accelerated network build
Accelerated network build Ericsson
 
The Ericsson Experiece at Mobile World Congress 2016
The Ericsson Experiece at Mobile World Congress 2016The Ericsson Experiece at Mobile World Congress 2016
The Ericsson Experiece at Mobile World Congress 2016Ericsson Latin America
 
Ericsson Networks Software 15B
Ericsson Networks Software 15BEricsson Networks Software 15B
Ericsson Networks Software 15BEricsson
 
TMT Value Chain - Digital Futures 2025
TMT Value Chain - Digital Futures 2025TMT Value Chain - Digital Futures 2025
TMT Value Chain - Digital Futures 2025Ovum
 
TADSummit, Enterprise & IIoT (Industrial Internet of Things) Mobile networks:...
TADSummit, Enterprise & IIoT (Industrial Internet of Things) Mobile networks:...TADSummit, Enterprise & IIoT (Industrial Internet of Things) Mobile networks:...
TADSummit, Enterprise & IIoT (Industrial Internet of Things) Mobile networks:...Alan Quayle
 
5G: the context, use cases, privacy, security and rules. Attilio Somma, TIM
5G: the context, use cases, privacy, security and rules. Attilio Somma, TIM5G: the context, use cases, privacy, security and rules. Attilio Somma, TIM
5G: the context, use cases, privacy, security and rules. Attilio Somma, TIMData Driven Innovation
 
IoT–How it revolutionizes the way we do business
IoT–How it revolutionizes the way we do businessIoT–How it revolutionizes the way we do business
IoT–How it revolutionizes the way we do businessM2M Alliance e.V.
 
Cost-efficient smart metering, a dynamic model for optimization of costs and ...
Cost-efficient smart metering, a dynamic model for optimization of costs and ...Cost-efficient smart metering, a dynamic model for optimization of costs and ...
Cost-efficient smart metering, a dynamic model for optimization of costs and ...Brightwell
 
Платформа создания инновационных услуг для телекоммуникационного оператора и ...
Платформа создания инновационных услуг для телекоммуникационного оператора и ...Платформа создания инновационных услуг для телекоммуникационного оператора и ...
Платформа создания инновационных услуг для телекоммуникационного оператора и ...Ericsson Russia
 
Diversifying cellular for massive IoT
Diversifying cellular for massive IoTDiversifying cellular for massive IoT
Diversifying cellular for massive IoTEricsson
 

What's hot (20)

Ericsson Technology Review - Issue1 2015
Ericsson Technology Review - Issue1 2015Ericsson Technology Review - Issue1 2015
Ericsson Technology Review - Issue1 2015
 
The path to 5G mobile networks
The path to 5G mobile networksThe path to 5G mobile networks
The path to 5G mobile networks
 
Accelerating IoT
Accelerating IoTAccelerating IoT
Accelerating IoT
 
Connected Vineyards
Connected VineyardsConnected Vineyards
Connected Vineyards
 
David Walker - Hyperoptic
David Walker - HyperopticDavid Walker - Hyperoptic
David Walker - Hyperoptic
 
Robert Curran - Aria Networks - INCA SDN/NFV Workshop
Robert Curran - Aria Networks  - INCA SDN/NFV WorkshopRobert Curran - Aria Networks  - INCA SDN/NFV Workshop
Robert Curran - Aria Networks - INCA SDN/NFV Workshop
 
5G – How to enable change-makers in the Networked Society
5G – How to enable change-makers in the Networked Society5G – How to enable change-makers in the Networked Society
5G – How to enable change-makers in the Networked Society
 
Digiturk_TV_Connect_2015
Digiturk_TV_Connect_2015Digiturk_TV_Connect_2015
Digiturk_TV_Connect_2015
 
Ericsson 5g services infographic
Ericsson 5g services infographicEricsson 5g services infographic
Ericsson 5g services infographic
 
Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016
 
Accelerated network build
Accelerated network build Accelerated network build
Accelerated network build
 
The Ericsson Experiece at Mobile World Congress 2016
The Ericsson Experiece at Mobile World Congress 2016The Ericsson Experiece at Mobile World Congress 2016
The Ericsson Experiece at Mobile World Congress 2016
 
Ericsson Networks Software 15B
Ericsson Networks Software 15BEricsson Networks Software 15B
Ericsson Networks Software 15B
 
TMT Value Chain - Digital Futures 2025
TMT Value Chain - Digital Futures 2025TMT Value Chain - Digital Futures 2025
TMT Value Chain - Digital Futures 2025
 
TADSummit, Enterprise & IIoT (Industrial Internet of Things) Mobile networks:...
TADSummit, Enterprise & IIoT (Industrial Internet of Things) Mobile networks:...TADSummit, Enterprise & IIoT (Industrial Internet of Things) Mobile networks:...
TADSummit, Enterprise & IIoT (Industrial Internet of Things) Mobile networks:...
 
5G: the context, use cases, privacy, security and rules. Attilio Somma, TIM
5G: the context, use cases, privacy, security and rules. Attilio Somma, TIM5G: the context, use cases, privacy, security and rules. Attilio Somma, TIM
5G: the context, use cases, privacy, security and rules. Attilio Somma, TIM
 
IoT–How it revolutionizes the way we do business
IoT–How it revolutionizes the way we do businessIoT–How it revolutionizes the way we do business
IoT–How it revolutionizes the way we do business
 
Cost-efficient smart metering, a dynamic model for optimization of costs and ...
Cost-efficient smart metering, a dynamic model for optimization of costs and ...Cost-efficient smart metering, a dynamic model for optimization of costs and ...
Cost-efficient smart metering, a dynamic model for optimization of costs and ...
 
Платформа создания инновационных услуг для телекоммуникационного оператора и ...
Платформа создания инновационных услуг для телекоммуникационного оператора и ...Платформа создания инновационных услуг для телекоммуникационного оператора и ...
Платформа создания инновационных услуг для телекоммуникационного оператора и ...
 
Diversifying cellular for massive IoT
Diversifying cellular for massive IoTDiversifying cellular for massive IoT
Diversifying cellular for massive IoT
 

Viewers also liked

Ip cable london_oct_2011_ben_schwarz_v1.0
Ip cable london_oct_2011_ben_schwarz_v1.0Ip cable london_oct_2011_ben_schwarz_v1.0
Ip cable london_oct_2011_ben_schwarz_v1.0Benjamin SCHWARZ
 
IPTV & OTT lessons from Europe for Latam operators - ABTA 2014 Ben Schwarz
IPTV & OTT lessons from Europe for Latam operators - ABTA 2014 Ben SchwarzIPTV & OTT lessons from Europe for Latam operators - ABTA 2014 Ben Schwarz
IPTV & OTT lessons from Europe for Latam operators - ABTA 2014 Ben SchwarzBenjamin SCHWARZ
 
OTT biz and tech challenges - (Innovation day, Cezke RadioKom) Prague nov 2014
OTT biz and tech challenges - (Innovation day, Cezke RadioKom) Prague nov 2014OTT biz and tech challenges - (Innovation day, Cezke RadioKom) Prague nov 2014
OTT biz and tech challenges - (Innovation day, Cezke RadioKom) Prague nov 2014Benjamin SCHWARZ
 
Gamining strategies for operators v2
Gamining strategies for operators v2Gamining strategies for operators v2
Gamining strategies for operators v2Benjamin SCHWARZ
 
Over the top: Operator Threat and Opportunity
Over the top: Operator Threat and OpportunityOver the top: Operator Threat and Opportunity
Over the top: Operator Threat and OpportunityCartesian (formerly CSMG)
 
Incendio backtobasics1-2007
Incendio backtobasics1-2007Incendio backtobasics1-2007
Incendio backtobasics1-2007Valentino Graiff
 
Gaming strategies for TV operators Updated presentation
Gaming strategies for TV operators Updated presentation Gaming strategies for TV operators Updated presentation
Gaming strategies for TV operators Updated presentation Benjamin SCHWARZ
 
Книги о Заречном
Книги о ЗаречномКниги о Заречном
Книги о ЗаречномBurovaevg
 
Indonesia strategy! research
Indonesia strategy! researchIndonesia strategy! research
Indonesia strategy! researchastronacci
 
Ultra HD Forum NAB 2016 Press Conference
Ultra HD Forum NAB 2016 Press ConferenceUltra HD Forum NAB 2016 Press Conference
Ultra HD Forum NAB 2016 Press ConferenceBenjamin SCHWARZ
 
The role of satellite in OTT
The role of satellite in OTTThe role of satellite in OTT
The role of satellite in OTTBenjamin SCHWARZ
 

Viewers also liked (19)

Home network & ott 2.1
Home network & ott 2.1Home network & ott 2.1
Home network & ott 2.1
 
Ip cable london_oct_2011_ben_schwarz_v1.0
Ip cable london_oct_2011_ben_schwarz_v1.0Ip cable london_oct_2011_ben_schwarz_v1.0
Ip cable london_oct_2011_ben_schwarz_v1.0
 
Ott TV strategies
Ott TV strategiesOtt TV strategies
Ott TV strategies
 
IPTV & OTT lessons from Europe for Latam operators - ABTA 2014 Ben Schwarz
IPTV & OTT lessons from Europe for Latam operators - ABTA 2014 Ben SchwarzIPTV & OTT lessons from Europe for Latam operators - ABTA 2014 Ben Schwarz
IPTV & OTT lessons from Europe for Latam operators - ABTA 2014 Ben Schwarz
 
OTT biz and tech challenges - (Innovation day, Cezke RadioKom) Prague nov 2014
OTT biz and tech challenges - (Innovation day, Cezke RadioKom) Prague nov 2014OTT biz and tech challenges - (Innovation day, Cezke RadioKom) Prague nov 2014
OTT biz and tech challenges - (Innovation day, Cezke RadioKom) Prague nov 2014
 
Business of offload v01
Business of offload v01Business of offload v01
Business of offload v01
 
Gamining strategies for operators v2
Gamining strategies for operators v2Gamining strategies for operators v2
Gamining strategies for operators v2
 
Apple TV: Evolution or Revolution?
Apple TV: Evolution or Revolution?Apple TV: Evolution or Revolution?
Apple TV: Evolution or Revolution?
 
Social TV Opinion piece
Social TV Opinion pieceSocial TV Opinion piece
Social TV Opinion piece
 
Over the top: Operator Threat and Opportunity
Over the top: Operator Threat and OpportunityOver the top: Operator Threat and Opportunity
Over the top: Operator Threat and Opportunity
 
Identity in the Internet Age
Identity in the Internet Age Identity in the Internet Age
Identity in the Internet Age
 
Incendio backtobasics1-2007
Incendio backtobasics1-2007Incendio backtobasics1-2007
Incendio backtobasics1-2007
 
Piano didattico 2005
Piano didattico 2005Piano didattico 2005
Piano didattico 2005
 
Gaming strategies for TV operators Updated presentation
Gaming strategies for TV operators Updated presentation Gaming strategies for TV operators Updated presentation
Gaming strategies for TV operators Updated presentation
 
Книги о Заречном
Книги о ЗаречномКниги о Заречном
Книги о Заречном
 
Indonesia strategy! research
Indonesia strategy! researchIndonesia strategy! research
Indonesia strategy! research
 
Ultra HD Forum NAB 2016 Press Conference
Ultra HD Forum NAB 2016 Press ConferenceUltra HD Forum NAB 2016 Press Conference
Ultra HD Forum NAB 2016 Press Conference
 
Pathophysio of pain
Pathophysio of painPathophysio of pain
Pathophysio of pain
 
The role of satellite in OTT
The role of satellite in OTTThe role of satellite in OTT
The role of satellite in OTT
 

Similar to Monetising ott presenentation on ott and risk management. march 2015

Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...Sumo Logic
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?PECB
 
Security & Compliance in the cloud - Pop-up Loft Tel Aviv
Security & Compliance in the cloud - Pop-up Loft Tel AvivSecurity & Compliance in the cloud - Pop-up Loft Tel Aviv
Security & Compliance in the cloud - Pop-up Loft Tel AvivAmazon Web Services
 
Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Shawn Nutley
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT ImplementationsTechWell
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud servicesComarch_Services
 
Web-of-Things and Services Security
Web-of-Things and Services SecurityWeb-of-Things and Services Security
Web-of-Things and Services SecurityOliver Pfaff
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at ScaleWinston Morton
 
Plataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaPlataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaHamilton Oliveira
 
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationGetting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationITpreneurs
 
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013Amazon Web Services
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105 Thomas Treml
 
Top cybersecurity certifications in 2022.pptx
Top cybersecurity certifications in 2022.pptxTop cybersecurity certifications in 2022.pptx
Top cybersecurity certifications in 2022.pptxinfosec train
 
Fortinet Solution Mapping with AWS Well-Architecture
Fortinet Solution Mapping with AWS Well-ArchitectureFortinet Solution Mapping with AWS Well-Architecture
Fortinet Solution Mapping with AWS Well-ArchitectureYitao Cen
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?Ulf Mattsson
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...Shah Sheikh
 
Hardening as a Part of a holistic Security Strategy (UPDATE)
Hardening as a Part of a holistic Security Strategy (UPDATE)Hardening as a Part of a holistic Security Strategy (UPDATE)
Hardening as a Part of a holistic Security Strategy (UPDATE)NoCodeHardening
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 

Similar to Monetising ott presenentation on ott and risk management. march 2015 (20)

Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
 
Security & Compliance in the cloud - Pop-up Loft Tel Aviv
Security & Compliance in the cloud - Pop-up Loft Tel AvivSecurity & Compliance in the cloud - Pop-up Loft Tel Aviv
Security & Compliance in the cloud - Pop-up Loft Tel Aviv
 
Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud services
 
Web-of-Things and Services Security
Web-of-Things and Services SecurityWeb-of-Things and Services Security
Web-of-Things and Services Security
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at Scale
 
Security in the cloud
Security in the cloudSecurity in the cloud
Security in the cloud
 
Plataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaPlataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação Cibernética
 
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationGetting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
 
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105
 
Top cybersecurity certifications in 2022.pptx
Top cybersecurity certifications in 2022.pptxTop cybersecurity certifications in 2022.pptx
Top cybersecurity certifications in 2022.pptx
 
Fortinet Solution Mapping with AWS Well-Architecture
Fortinet Solution Mapping with AWS Well-ArchitectureFortinet Solution Mapping with AWS Well-Architecture
Fortinet Solution Mapping with AWS Well-Architecture
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?
 
CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
Hardening as a Part of a holistic Security Strategy (UPDATE)
Hardening as a Part of a holistic Security Strategy (UPDATE)Hardening as a Part of a holistic Security Strategy (UPDATE)
Hardening as a Part of a holistic Security Strategy (UPDATE)
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 

Recently uploaded

ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 

Recently uploaded (11)

ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 

Monetising ott presenentation on ott and risk management. march 2015

  • 1. Managing the security challenges presented by OTT Monetising OTT London March 26th 2015 Ben Schwarz - bs@ctoic.net
  • 2. Workshop agenda Security concerns may be considered ‘old hat’ to telecoms operators, we’ve always had them! However, the age of IoT and OTT delivery has changed this. In this workshop we will discuss YOUR OTT security concerns, and work to try and solve these, whilst also: – Identifying the drivers of concern amongst both operators and consumers of OTT security – is it all about privacy? – Determining to what extent security can delight customers in the age of IoT, despite the fact that early DRM systems were considered a hindrance – Establishing whether analytics can and should be run through the security system – Debating whether security should be connected, as OTT services are Ben Schwarz - bs@ctoic.net
  • 3. Some security challenges • Speed up provisioning • Increase agility to adapt to new threats • Develop and maintain ever deeper expertise • Improve Cost effectiveness • Don’t miss the Analytics boat • Adapt security to evolving risk level (inc. during a single session) Ben Schwarz - bs@ctoic.net
  • 4. DRM at the turn of the century Ben Schwarz - bs@ctoic.net
  • 5. But DRM must also be … • About making users’ lives easier – Addressing privacy concerns – Facilitating sharing, testing/tasting • For managing & promoting Digital Rights – The original goal of DRM • Connected – experience continuity, adaptability • Security domains are merging – E.g. pay TV and Smart Home, … Ben Schwarz - bs@ctoic.net
  • 6. So what is Security? • It depends who you ask: – Authentication, Authorization, Rights management – Deterrent, preventive, detective, corrective – Encryption & protection? – Emergency response? Processes ? • Security / identity / Privacy – Why is there still a plethora of password management companies out there? • Despite SSO, authentication still needs work and Identity theft still righty scares people Ben Schwarz - bs@ctoic.net
  • 7. Physical Conceptual Contextual Logical Component An IT Architects view on security Ben Schwarz - bs@ctoic.net
  • 8. Physical or Virtual Cloud Component A pragmatist pay TV view Ben Schwarz - bs@ctoic.net
  • 9. Server infrastructure Content creation Distribution / broadcast Service consumption Content Storage So where does security come in for OTT delivery of pay TV Ben Schwarz - bs@ctoic.net Security domain 1 Security domain 2 Security domain 3 Security domain 4
  • 10. Security and product lifecycles Design Build TestSpecify Establish security requirements Identify Key threats Remove unsafe features Analyze risk vs. security Incident response plan Training Run Ben Schwarz - bs@ctoic.net
  • 11. Real-world and digital resources Content security Authorization Authentication Analytics Rights management Ben Schwarz - bs@ctoic.net
  • 12. Content security Authorization Analytics Rights management Authentication 1 4 Start VoD session 2 … 6 5 3 Content store Big data Analytics Fully in- house Fully outsourced In-house &/or outsourced Entitlements database Subscriber managemen t system Abstraction layer The importance of an abstraction layer Components can be delocalized as required Ben Schwarz - bs@ctoic.net
  • 13. Does OTT change risk? • In an OTT environment, the content protection risks themselves are similar, only the impact of a breach can be greater. • When operator aggregates an OTT service through their controlled infrastructure (e.g. Netflix) the aggregator carrier little or no risk. • Whether OTT or not the risk on user data has much longer-term impact than the risk on content. Ben Schwarz - bs@ctoic.net