SlideShare a Scribd company logo
1 of 27
Download to read offline
The INTERNET of THINGS?
March 16th, 2016
Chadi HANTOUCHE
Cybersecurity Senior Manager
@chadihantouche
Can we SECURE
2
Agenda
1. At the heart of digital transformation►
2. CARA: the 4 risk dimensions
3. Which security measures?
4. Final thoughts
3
Connected devices are expanding in all areas
Home automation Physical security
Healthcare and comfort
Light bulbs Thermostats
Thermometers
TVs
Door locks
Wristbands
Smoke detectorsCCTVs
CarsBike sensors
Forks Tensiometer
Heart rate monitorsGlasses
Watches
Trackers
Strollers
Keychains Padlocks
Vehicles and mobility
Roller blinds
16 March 2016 - Property of Solucom, all rights reserved
4
26
billion
30
billion
50
billion
80
billion
212
billion
Billions of smart devices announced for 2020…
Some estimations are quite high…
… and some others more moderate!
16 March 2016 - Property of Solucom, all rights reserved
5
…but projects and PoCs are already here!
Singapore V2x initiative
John Hancock policy holders who wear
Internet-connected Fitbit can get discounts of up
to 15% on their life insurance policy.
John Hancock + Fitbit
Allianz partnered with Nest Labs in order to
give every new subscriber a smoke detector.
Allianz + Nest Labs
BMW Innovation introduced at CES 2015 a car
model that can be remotely controlled by a
smartwatch.
BMW + Samsung
16 March 2016 - Property of Solucom, all rights reserved
In 2015, the EDB of Singapore has largely
funded the US$16 million that will be pumped
into the NTU-NXP (semi-conductors firm)
project, involving 100 vehicles and 50 roadside
units within 4 years
6
A broader attack surface for cybercriminals
Examples of attacks on smart devices
Personal data theft of the carrier,
pacemaker control (sending shocks
possibly leading to a heart attack),
possibility of infecting other
pacemakers in range.
Use of a Web browser to take
control of the camera, change the
DNS settings and inject viruses into
other applications.
Black Hat USA: demonstration of a
remote pacemaker hack
Remote Intrusion, including the ability
to kill the engine, engage or disable the
brakes, or track the car’s GPS position.
Black Hat USA: demonstration of a Jeep
Cherokee complete remote control
Black Hat USA: demonstration of an
intrusion on a connected TV
Demonstration of attacks on the Smart
home control hubs from connected
devices (NEST Thermostat, INSTEON
Hub…).
Black Hat USA: demonstration of attacks
on home connected devices
16 March 2016 - Property of Solucom, all rights reserved
7
Risk categories are shared by all connected devices
Heart rate
monitorsThermometers
Blood pressure
monitors
Baby-strollers
Smartwatches
Roller blinds
Thermostats
Door
locks
CCTVs
Personal data
leakage
Loss of collected data’s
confidentiality and integrity
Endangering
safety of persons
Denial of
service
Access control
bypass
Unavailability of the
sensor/device
…
Cars
Smoke detectors
Light bulbs
Home
automation
Healthcare
Physical
security
Mobility
16 March 2016 - Property of Solucom, all rights reserved
8
Agenda
16 March 2016 - Property of Solucom, all rights reserved
1. At the heart of digital transformation
2. CARA: the 4 risk dimensions►
3. Which security measures?
4. Final thoughts
9
Risk dimensions of connected devices
4 possible settings for smart devices in a business context
Companies that manufacture connected
devices must take security into account from
the design phase, since they have a
responsibility towards their customers.
Companies that allow the use of employees’
connected devices (as a BYOD service), have
to protect professional data.
Companies that recommend connected
devices to their customers have a diffused
responsibility that extends over time regarding
the customers.
Companies that buy connected devices and
deploy them internally share responsibilities
on technologies choices and integration
phases.
Create
Recommend
Acquire
Accommodate
16 March 2016 - Property of Solucom, all rights reserved
10
Risk dimensions of connected devices
The risks depend on the organization’s/company’s setting
Discovering security flaws in connected
devices could endanger users or their data,
and therefore the reputation and liability of the
manufacturer.
Loss or theft of corporate data to which
connected devices have access, or intrusion
facilitation.
Leakage of (possibly personal) data or
physical damages that could lead to a
company liability, or reputation damage.
Integration of these new technologies within
the business process without proper security,
which could increase the IT systems’ attack
surface.
Create
Recommend
Acquire
Accommodate
16 March 2016 - Property of Solucom, all rights reserved
11
A simple tool to interact with business stakeholders: the heat map
Usages risk levels
Complexity to
customize security
CREATE
ACQUIRE
RECOMMEND
ACCOMMODATE
USE 1 USE 2 USE 3 USE 4
16 March 2016 - Property of Solucom, all rights reserved
12
Practical applications in a B2C banking context
I would like to reflect an
innovative image by allowing
our customers to virtually
browse their investment
portfolio!
New smartwatches are
released, we need an
application! Besides, we must
boost our smartphone
applications with new
features.
We would like to simplify the payment process without
getting surpassed by GAFA, could we test contactless
payment wristbands?
It would be really great to
recognize customers when
they enter the agency!
What if we equipped our advisors with wristbands to
perform digital signature?
16 March 2016 - Property of Solucom, all rights reserved
13
Practical application of the heat map in a B2C banking context
NOTIFICATION CONSULTATION MODIFICATION TRANSACTION
CREATE
ACQUIRE
RECOMMEND
ACCOMMODATE
Contactless payment with
a connected wristband
Customer identification
with Google Glass
Digital signature with
a smartwatch
Stock portfolio 3D visualization
with Oculus Rift
Accounts notification and checking on a smartwatch Account data change or transaction with a smartphone
Usages risk levels
Complexity to
customize security
16 March 2016 - Property of Solucom, all rights reserved
14
Practical application: risk zone identification
Usages risk levels
NOTIFICATION CONSULTATION MODIFICATION TRANSACTION
CREATE
ACQUIRE
RECOMMEND
ACCOMMODATE
Contactless payment with
a connected wristband
Customer identification
with Google Glass
Digital signature with
a smartwatch
Stock portfolio 3D visualization
with Oculus Rift
Accounts notification and checking on a smartwatch Account data change or transaction with a smartphone
Complexity to
customize security
16 March 2016 - Property of Solucom, all rights reserved
15
Agenda
16 March 2016 - Property of Solucom, all rights reserved
1. At the heart of digital transformation
2. CARA: the 4 risk dimensions
3. Which security measures?►
4. Final thoughts
16
Security measures are the usual ones…
16 March 2016 - Property of Solucom, all rights reserved
17
…but their implementation must be innovative!
16 March 2016 - Property of Solucom, all rights reserved
18
…but their implementation must be innovative!
Various with the same OS but different battery lives
Apple’s recommendations for Apple Watch developers
Typing a password on a small screen
would be difficult for the user.
• Limited processing power
Computing
• Take into account the fact that
communication with the connected
devices is usually done with
Bluetooth or NFC connections
Connectivity
• Possible actions strongly depend
on the size, form-factor and
features of the device!
User Experience
• Pay attention to implementation
choices, e.g. for data encryption
(asymmetric vs. symmetric
encryption)
Battery Life
16 March 2016 - Property of Solucom, all rights reserved
19
… and which should be prioritized
• Integrate security in the early design
phases.
• In particular, ensure security update
capabilities throughout the (possibly
long) device lifecycle.
• Ensure that device identities are properly
managed.
• Request custom hardening from the
manufacturers.
• Clearly define liabilities (and data
ownership).
• Ensure regulatory compliance.
• Ensure the recommended devices have a
proper security level.
• Make users aware of their
responsibilities.
• Enforce a user charter.
• Reuse previous BYOD projects.
But also:
Think outside the box!
Create Acquire
AccommodateRecommend
16 March 2016 - Property of Solucom, all rights reserved
20
Example of innovative security
Source : PRESERVE Project, www.preserve-project.eu
The car embeds a HSM, and
hundreds of certificates
Another use case: connected cars and roads
with a strong need of both integrity and privacy
The certificate used to ensure the
integrity of messages is changed at
a random frequency
When going to the garage for tune-
up, the certificates can be renewed
16 March 2016 - Property of Solucom, all rights reserved
21
Agenda
16 March 2016 - Property of Solucom, all rights reserved
1. At the heart of digital transformation
2. CARA: the 4 risk dimensions
3. Which security measures?
4. Final thoughts►
22
4 recommendations towards security for the IoT
Do not secure the IoT devices like your usual IT!
It is important to understand the business stakes
during the whole device lifecycle, in order to
clarify and anticipate possible risks.
Talk with the business stakeholders
MARKETING AND
SALES
MANUFACTURERS
HUMAN RESSOURCS
BOARD
SUPPLY CHAIN
MANAGEMENT
RESEARCH AND
DEVELOPMENT
ADMINISTRATION
LEGAL DEPARTMENT
16 March 2016 - Property of Solucom, all rights reserved
23
4 recommendations towards security for the IoT
Do not secure the IoT devices like your usual IT!
The risks of connected devices may differ
depending on the usages and the setting
(CARA).
Furthermore, depending on your industry, the
devices will not be used the same way.
Clarify the use cases
NOTIFICATION CONSULTATION MODIFICATION TRANSACTION
Low risk High risk
Examples in banking
16 March 2016 - Property of Solucom, all rights reserved
24
4 recommendations towards security for the IoT
TIZEN
PEEBLE OS
OS
MICRIUM
ANDROID
WATCH OS
FREE
RTOS
I’M DROID
Do not secure the IoT devices like your usual IT!
Two relatively similar devices may not be equally
secured.
It becomes necessary to identify the specifics of
the platforms and the associated limits.
Analyze the market and the platforms
16 March 2016 - Property of Solucom, all rights reserved
25
4 recommendations towards security for the IoT
Do not secure the IoT devices like your usual IT!
Take into account the context in which connected
devices evolve, as well as their characteristics:
autonomy, range, user experience…
Think outside the box to implement security
16 March 2016 - Property of Solucom, all rights reserved
26
4 recommendations towards security for the IoT
It is important to understand the business stakes
during the whole device lifecycle, in order to
clarify and anticipate possible risks.
The risks of connected devices may differ
depending on the usages and the setting
(CARA).
Furthermore, depending on your industry, the
devices will not be used the same way.
Two relatively similar devices may not be equally
secured.
It becomes necessary to identify the specifics of
the platforms and the associated limits.
Take into account the context in which connected
devices evolve, as well as their characteristics:
autonomy, range, user experience…
Analyze the market and the platforms
Talk with the business stakeholders Clarify the use cases
Think outside the box to implement security
16 March 2016 - Property of Solucom, all rights reserved
Do not secure the IoT devices like your usual IT!
www.solucom.fr
Chadi HANTOUCHE
Cybersecurity Senior Manager
chadi.hantouche@solucom.sg
@chadihantouche

More Related Content

What's hot

The Internet of Things in insurance
The Internet of Things in insurance The Internet of Things in insurance
The Internet of Things in insurance Andrea Silvello
 
TKSTAR GPS Tracker Review
TKSTAR GPS Tracker ReviewTKSTAR GPS Tracker Review
TKSTAR GPS Tracker ReviewSHarriman1
 
Making a Better World with Technology Innovations
Making a Better World with Technology InnovationsMaking a Better World with Technology Innovations
Making a Better World with Technology InnovationsImesh Gunaratne
 
Industrial internet of things (IIOT) - special report-2017
Industrial internet of things (IIOT) - special report-2017Industrial internet of things (IIOT) - special report-2017
Industrial internet of things (IIOT) - special report-2017Ian Beckett
 
Tracxn Research — Wearable Technology Landscape, December 2016
Tracxn Research — Wearable Technology Landscape, December 2016Tracxn Research — Wearable Technology Landscape, December 2016
Tracxn Research — Wearable Technology Landscape, December 2016Tracxn
 
The Top 5 Fintech Trends Everyone Should Be Watching In 2020
The Top 5 Fintech Trends Everyone Should Be Watching In 2020The Top 5 Fintech Trends Everyone Should Be Watching In 2020
The Top 5 Fintech Trends Everyone Should Be Watching In 2020Bernard Marr
 
Business Innovation Case Study - Pitney Bowes and Location Intelligence
Business Innovation Case Study - Pitney Bowes and Location IntelligenceBusiness Innovation Case Study - Pitney Bowes and Location Intelligence
Business Innovation Case Study - Pitney Bowes and Location IntelligenceJigisha Aryya
 
Mobile World Congress 2015: What we learned at MWC and what brands have to kn...
Mobile World Congress 2015: What we learned at MWC and what brands have to kn...Mobile World Congress 2015: What we learned at MWC and what brands have to kn...
Mobile World Congress 2015: What we learned at MWC and what brands have to kn...yann le gigan
 
Internet of Things (IoT) Strategic Patent Development 1Q 2016
Internet of Things (IoT) Strategic Patent Development 1Q 2016Internet of Things (IoT) Strategic Patent Development 1Q 2016
Internet of Things (IoT) Strategic Patent Development 1Q 2016Alex G. Lee, Ph.D. Esq. CLP
 
M2M group presentation
M2M group presentation M2M group presentation
M2M group presentation Hassan Magdy
 
Online Travel Trends Report 2021
Online Travel Trends Report 2021 Online Travel Trends Report 2021
Online Travel Trends Report 2021 Mauricio Prieto
 

What's hot (11)

The Internet of Things in insurance
The Internet of Things in insurance The Internet of Things in insurance
The Internet of Things in insurance
 
TKSTAR GPS Tracker Review
TKSTAR GPS Tracker ReviewTKSTAR GPS Tracker Review
TKSTAR GPS Tracker Review
 
Making a Better World with Technology Innovations
Making a Better World with Technology InnovationsMaking a Better World with Technology Innovations
Making a Better World with Technology Innovations
 
Industrial internet of things (IIOT) - special report-2017
Industrial internet of things (IIOT) - special report-2017Industrial internet of things (IIOT) - special report-2017
Industrial internet of things (IIOT) - special report-2017
 
Tracxn Research — Wearable Technology Landscape, December 2016
Tracxn Research — Wearable Technology Landscape, December 2016Tracxn Research — Wearable Technology Landscape, December 2016
Tracxn Research — Wearable Technology Landscape, December 2016
 
The Top 5 Fintech Trends Everyone Should Be Watching In 2020
The Top 5 Fintech Trends Everyone Should Be Watching In 2020The Top 5 Fintech Trends Everyone Should Be Watching In 2020
The Top 5 Fintech Trends Everyone Should Be Watching In 2020
 
Business Innovation Case Study - Pitney Bowes and Location Intelligence
Business Innovation Case Study - Pitney Bowes and Location IntelligenceBusiness Innovation Case Study - Pitney Bowes and Location Intelligence
Business Innovation Case Study - Pitney Bowes and Location Intelligence
 
Mobile World Congress 2015: What we learned at MWC and what brands have to kn...
Mobile World Congress 2015: What we learned at MWC and what brands have to kn...Mobile World Congress 2015: What we learned at MWC and what brands have to kn...
Mobile World Congress 2015: What we learned at MWC and what brands have to kn...
 
Internet of Things (IoT) Strategic Patent Development 1Q 2016
Internet of Things (IoT) Strategic Patent Development 1Q 2016Internet of Things (IoT) Strategic Patent Development 1Q 2016
Internet of Things (IoT) Strategic Patent Development 1Q 2016
 
M2M group presentation
M2M group presentation M2M group presentation
M2M group presentation
 
Online Travel Trends Report 2021
Online Travel Trends Report 2021 Online Travel Trends Report 2021
Online Travel Trends Report 2021
 

Viewers also liked

Charity Retail Conference 2015: Security & Compliance
Charity Retail Conference 2015: Security & ComplianceCharity Retail Conference 2015: Security & Compliance
Charity Retail Conference 2015: Security & Compliancepropatrea
 
INTELLIGENT FACE RECOGNITION TECHNIQUES
INTELLIGENT FACE RECOGNITION TECHNIQUESINTELLIGENT FACE RECOGNITION TECHNIQUES
INTELLIGENT FACE RECOGNITION TECHNIQUESChirag Jain
 
Firewall Penetration Testing
Firewall Penetration TestingFirewall Penetration Testing
Firewall Penetration TestingChirag Jain
 

Viewers also liked (20)

DNS hijacking - null Singapore
DNS hijacking - null SingaporeDNS hijacking - null Singapore
DNS hijacking - null Singapore
 
Hacker's jargons
Hacker's jargonsHacker's jargons
Hacker's jargons
 
Humla workshop on Android Security Testing - null Singapore
Humla workshop on Android Security Testing - null SingaporeHumla workshop on Android Security Testing - null Singapore
Humla workshop on Android Security Testing - null Singapore
 
Three things that rowhammer taught me by Halvar Flake
Three things that rowhammer taught me by Halvar FlakeThree things that rowhammer taught me by Halvar Flake
Three things that rowhammer taught me by Halvar Flake
 
Attacking VPN's
Attacking VPN'sAttacking VPN's
Attacking VPN's
 
iOS Application Pentesting
iOS Application PentestingiOS Application Pentesting
iOS Application Pentesting
 
Identifying XSS Vulnerabilities
Identifying XSS VulnerabilitiesIdentifying XSS Vulnerabilities
Identifying XSS Vulnerabilities
 
News Bytes - December 2015
News Bytes - December 2015News Bytes - December 2015
News Bytes - December 2015
 
Newbytes NullHyd
Newbytes NullHydNewbytes NullHyd
Newbytes NullHyd
 
The LabRat - Physical backdoor hacks and IOT primer
The LabRat - Physical backdoor hacks and IOT primerThe LabRat - Physical backdoor hacks and IOT primer
The LabRat - Physical backdoor hacks and IOT primer
 
Charity Retail Conference 2015: Security & Compliance
Charity Retail Conference 2015: Security & ComplianceCharity Retail Conference 2015: Security & Compliance
Charity Retail Conference 2015: Security & Compliance
 
OAuth Tokens
OAuth TokensOAuth Tokens
OAuth Tokens
 
Firewalking
FirewalkingFirewalking
Firewalking
 
Stegano Secrets - Python
Stegano Secrets - PythonStegano Secrets - Python
Stegano Secrets - Python
 
INTELLIGENT FACE RECOGNITION TECHNIQUES
INTELLIGENT FACE RECOGNITION TECHNIQUESINTELLIGENT FACE RECOGNITION TECHNIQUES
INTELLIGENT FACE RECOGNITION TECHNIQUES
 
InSecurity in E-Commerce Applications
InSecurity in E-Commerce ApplicationsInSecurity in E-Commerce Applications
InSecurity in E-Commerce Applications
 
Managing third party libraries
Managing third party librariesManaging third party libraries
Managing third party libraries
 
Firewall Penetration Testing
Firewall Penetration TestingFirewall Penetration Testing
Firewall Penetration Testing
 
Pentesting RESTful WebServices v1.0
Pentesting RESTful WebServices v1.0Pentesting RESTful WebServices v1.0
Pentesting RESTful WebServices v1.0
 
Unit 2 e commerce applications
Unit 2 e commerce applicationsUnit 2 e commerce applications
Unit 2 e commerce applications
 

Similar to The INTERNET of THINGS? Securing Connected Devices

IoT Breakfast Briefing
IoT Breakfast BriefingIoT Breakfast Briefing
IoT Breakfast BriefingSomo
 
Silicon Valley Workshop: IoT/Big Data/AI Innovation & Strategy Insights from ...
Silicon Valley Workshop: IoT/Big Data/AI Innovation & Strategy Insights from ...Silicon Valley Workshop: IoT/Big Data/AI Innovation & Strategy Insights from ...
Silicon Valley Workshop: IoT/Big Data/AI Innovation & Strategy Insights from ...Alex G. Lee, Ph.D. Esq. CLP
 
Meetup8 IoT trends 2016
Meetup8 IoT trends 2016Meetup8 IoT trends 2016
Meetup8 IoT trends 2016Francesco Rago
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONJohn Pinson
 
IoT + Big Data + Cloud + AI Integration Strategy Insights from Patents
IoT + Big Data + Cloud + AI Integration Strategy Insights from PatentsIoT + Big Data + Cloud + AI Integration Strategy Insights from Patents
IoT + Big Data + Cloud + AI Integration Strategy Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Microservices: The Future-Proof Framework for IoT
Microservices: The Future-Proof Framework for IoTMicroservices: The Future-Proof Framework for IoT
Microservices: The Future-Proof Framework for IoTCapgemini
 
The Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesThe Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesWavestone
 
Achieving Relevance in a Digital Landscape
Achieving Relevance in a Digital LandscapeAchieving Relevance in a Digital Landscape
Achieving Relevance in a Digital LandscapeSomo
 
Zero Distance - Transform or Die! by Thomas Spreitzer
Zero Distance - Transform or Die! by Thomas SpreitzerZero Distance - Transform or Die! by Thomas Spreitzer
Zero Distance - Transform or Die! by Thomas SpreitzerChristoph Schulz
 
Wearables devices market and technology
Wearables devices market and technologyWearables devices market and technology
Wearables devices market and technologyKevin Huang
 
160309 테헤란로 런치클럽_특허 관점의 IoT 전략(IoT Strategy : Patent Perspectives)
160309 테헤란로 런치클럽_특허 관점의 IoT 전략(IoT Strategy : Patent Perspectives)160309 테헤란로 런치클럽_특허 관점의 IoT 전략(IoT Strategy : Patent Perspectives)
160309 테헤란로 런치클럽_특허 관점의 IoT 전략(IoT Strategy : Patent Perspectives)StartupAlliance
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptxChandravadhanaNaraya
 
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock
 
Internet of Things (IoT) Strategy : Patent Perspectives
Internet of Things (IoT) Strategy :Patent PerspectivesInternet of Things (IoT) Strategy :Patent Perspectives
Internet of Things (IoT) Strategy : Patent PerspectivesAlex G. Lee, Ph.D. Esq. CLP
 
Mobile World Congress 2018 Review by Marco Papale
Mobile World Congress 2018 Review by Marco PapaleMobile World Congress 2018 Review by Marco Papale
Mobile World Congress 2018 Review by Marco PapaleMarco Papale
 
IoT and Insurance - Insurance breakfast
IoT and Insurance - Insurance breakfastIoT and Insurance - Insurance breakfast
IoT and Insurance - Insurance breakfastComarch
 
Jump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data ClassificationJump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data ClassificationWatchful Software
 
Internet of Things (IoT) Strategic Patent Development and Monetization for Ne...
Internet of Things (IoT) Strategic Patent Development and Monetization for Ne...Internet of Things (IoT) Strategic Patent Development and Monetization for Ne...
Internet of Things (IoT) Strategic Patent Development and Monetization for Ne...Alex G. Lee, Ph.D. Esq. CLP
 

Similar to The INTERNET of THINGS? Securing Connected Devices (20)

IoT Breakfast Briefing
IoT Breakfast BriefingIoT Breakfast Briefing
IoT Breakfast Briefing
 
Silicon Valley Workshop: IoT/Big Data/AI Innovation & Strategy Insights from ...
Silicon Valley Workshop: IoT/Big Data/AI Innovation & Strategy Insights from ...Silicon Valley Workshop: IoT/Big Data/AI Innovation & Strategy Insights from ...
Silicon Valley Workshop: IoT/Big Data/AI Innovation & Strategy Insights from ...
 
Meetup8 IoT trends 2016
Meetup8 IoT trends 2016Meetup8 IoT trends 2016
Meetup8 IoT trends 2016
 
IBM Xforce Q4 2014
IBM Xforce Q4 2014IBM Xforce Q4 2014
IBM Xforce Q4 2014
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTION
 
IoT + Big Data + Cloud + AI Integration Strategy Insights from Patents
IoT + Big Data + Cloud + AI Integration Strategy Insights from PatentsIoT + Big Data + Cloud + AI Integration Strategy Insights from Patents
IoT + Big Data + Cloud + AI Integration Strategy Insights from Patents
 
Microservices: The Future-Proof Framework for IoT
Microservices: The Future-Proof Framework for IoTMicroservices: The Future-Proof Framework for IoT
Microservices: The Future-Proof Framework for IoT
 
The Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesThe Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devices
 
Achieving Relevance in a Digital Landscape
Achieving Relevance in a Digital LandscapeAchieving Relevance in a Digital Landscape
Achieving Relevance in a Digital Landscape
 
Zero Distance - Transform or Die! by Thomas Spreitzer
Zero Distance - Transform or Die! by Thomas SpreitzerZero Distance - Transform or Die! by Thomas Spreitzer
Zero Distance - Transform or Die! by Thomas Spreitzer
 
Pas d'IoT sans Identité!
Pas d'IoT sans Identité!Pas d'IoT sans Identité!
Pas d'IoT sans Identité!
 
Wearables devices market and technology
Wearables devices market and technologyWearables devices market and technology
Wearables devices market and technology
 
160309 테헤란로 런치클럽_특허 관점의 IoT 전략(IoT Strategy : Patent Perspectives)
160309 테헤란로 런치클럽_특허 관점의 IoT 전략(IoT Strategy : Patent Perspectives)160309 테헤란로 런치클럽_특허 관점의 IoT 전략(IoT Strategy : Patent Perspectives)
160309 테헤란로 런치클럽_특허 관점의 IoT 전략(IoT Strategy : Patent Perspectives)
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit
 
Internet of Things (IoT) Strategy : Patent Perspectives
Internet of Things (IoT) Strategy :Patent PerspectivesInternet of Things (IoT) Strategy :Patent Perspectives
Internet of Things (IoT) Strategy : Patent Perspectives
 
Mobile World Congress 2018 Review by Marco Papale
Mobile World Congress 2018 Review by Marco PapaleMobile World Congress 2018 Review by Marco Papale
Mobile World Congress 2018 Review by Marco Papale
 
IoT and Insurance - Insurance breakfast
IoT and Insurance - Insurance breakfastIoT and Insurance - Insurance breakfast
IoT and Insurance - Insurance breakfast
 
Jump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data ClassificationJump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data Classification
 
Internet of Things (IoT) Strategic Patent Development and Monetization for Ne...
Internet of Things (IoT) Strategic Patent Development and Monetization for Ne...Internet of Things (IoT) Strategic Patent Development and Monetization for Ne...
Internet of Things (IoT) Strategic Patent Development and Monetization for Ne...
 

More from n|u - The Open Security Community

Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...n|u - The Open Security Community
 

More from n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Recently uploaded

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 

Recently uploaded (20)

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 

The INTERNET of THINGS? Securing Connected Devices

  • 1. The INTERNET of THINGS? March 16th, 2016 Chadi HANTOUCHE Cybersecurity Senior Manager @chadihantouche Can we SECURE
  • 2. 2 Agenda 1. At the heart of digital transformation► 2. CARA: the 4 risk dimensions 3. Which security measures? 4. Final thoughts
  • 3. 3 Connected devices are expanding in all areas Home automation Physical security Healthcare and comfort Light bulbs Thermostats Thermometers TVs Door locks Wristbands Smoke detectorsCCTVs CarsBike sensors Forks Tensiometer Heart rate monitorsGlasses Watches Trackers Strollers Keychains Padlocks Vehicles and mobility Roller blinds 16 March 2016 - Property of Solucom, all rights reserved
  • 4. 4 26 billion 30 billion 50 billion 80 billion 212 billion Billions of smart devices announced for 2020… Some estimations are quite high… … and some others more moderate! 16 March 2016 - Property of Solucom, all rights reserved
  • 5. 5 …but projects and PoCs are already here! Singapore V2x initiative John Hancock policy holders who wear Internet-connected Fitbit can get discounts of up to 15% on their life insurance policy. John Hancock + Fitbit Allianz partnered with Nest Labs in order to give every new subscriber a smoke detector. Allianz + Nest Labs BMW Innovation introduced at CES 2015 a car model that can be remotely controlled by a smartwatch. BMW + Samsung 16 March 2016 - Property of Solucom, all rights reserved In 2015, the EDB of Singapore has largely funded the US$16 million that will be pumped into the NTU-NXP (semi-conductors firm) project, involving 100 vehicles and 50 roadside units within 4 years
  • 6. 6 A broader attack surface for cybercriminals Examples of attacks on smart devices Personal data theft of the carrier, pacemaker control (sending shocks possibly leading to a heart attack), possibility of infecting other pacemakers in range. Use of a Web browser to take control of the camera, change the DNS settings and inject viruses into other applications. Black Hat USA: demonstration of a remote pacemaker hack Remote Intrusion, including the ability to kill the engine, engage or disable the brakes, or track the car’s GPS position. Black Hat USA: demonstration of a Jeep Cherokee complete remote control Black Hat USA: demonstration of an intrusion on a connected TV Demonstration of attacks on the Smart home control hubs from connected devices (NEST Thermostat, INSTEON Hub…). Black Hat USA: demonstration of attacks on home connected devices 16 March 2016 - Property of Solucom, all rights reserved
  • 7. 7 Risk categories are shared by all connected devices Heart rate monitorsThermometers Blood pressure monitors Baby-strollers Smartwatches Roller blinds Thermostats Door locks CCTVs Personal data leakage Loss of collected data’s confidentiality and integrity Endangering safety of persons Denial of service Access control bypass Unavailability of the sensor/device … Cars Smoke detectors Light bulbs Home automation Healthcare Physical security Mobility 16 March 2016 - Property of Solucom, all rights reserved
  • 8. 8 Agenda 16 March 2016 - Property of Solucom, all rights reserved 1. At the heart of digital transformation 2. CARA: the 4 risk dimensions► 3. Which security measures? 4. Final thoughts
  • 9. 9 Risk dimensions of connected devices 4 possible settings for smart devices in a business context Companies that manufacture connected devices must take security into account from the design phase, since they have a responsibility towards their customers. Companies that allow the use of employees’ connected devices (as a BYOD service), have to protect professional data. Companies that recommend connected devices to their customers have a diffused responsibility that extends over time regarding the customers. Companies that buy connected devices and deploy them internally share responsibilities on technologies choices and integration phases. Create Recommend Acquire Accommodate 16 March 2016 - Property of Solucom, all rights reserved
  • 10. 10 Risk dimensions of connected devices The risks depend on the organization’s/company’s setting Discovering security flaws in connected devices could endanger users or their data, and therefore the reputation and liability of the manufacturer. Loss or theft of corporate data to which connected devices have access, or intrusion facilitation. Leakage of (possibly personal) data or physical damages that could lead to a company liability, or reputation damage. Integration of these new technologies within the business process without proper security, which could increase the IT systems’ attack surface. Create Recommend Acquire Accommodate 16 March 2016 - Property of Solucom, all rights reserved
  • 11. 11 A simple tool to interact with business stakeholders: the heat map Usages risk levels Complexity to customize security CREATE ACQUIRE RECOMMEND ACCOMMODATE USE 1 USE 2 USE 3 USE 4 16 March 2016 - Property of Solucom, all rights reserved
  • 12. 12 Practical applications in a B2C banking context I would like to reflect an innovative image by allowing our customers to virtually browse their investment portfolio! New smartwatches are released, we need an application! Besides, we must boost our smartphone applications with new features. We would like to simplify the payment process without getting surpassed by GAFA, could we test contactless payment wristbands? It would be really great to recognize customers when they enter the agency! What if we equipped our advisors with wristbands to perform digital signature? 16 March 2016 - Property of Solucom, all rights reserved
  • 13. 13 Practical application of the heat map in a B2C banking context NOTIFICATION CONSULTATION MODIFICATION TRANSACTION CREATE ACQUIRE RECOMMEND ACCOMMODATE Contactless payment with a connected wristband Customer identification with Google Glass Digital signature with a smartwatch Stock portfolio 3D visualization with Oculus Rift Accounts notification and checking on a smartwatch Account data change or transaction with a smartphone Usages risk levels Complexity to customize security 16 March 2016 - Property of Solucom, all rights reserved
  • 14. 14 Practical application: risk zone identification Usages risk levels NOTIFICATION CONSULTATION MODIFICATION TRANSACTION CREATE ACQUIRE RECOMMEND ACCOMMODATE Contactless payment with a connected wristband Customer identification with Google Glass Digital signature with a smartwatch Stock portfolio 3D visualization with Oculus Rift Accounts notification and checking on a smartwatch Account data change or transaction with a smartphone Complexity to customize security 16 March 2016 - Property of Solucom, all rights reserved
  • 15. 15 Agenda 16 March 2016 - Property of Solucom, all rights reserved 1. At the heart of digital transformation 2. CARA: the 4 risk dimensions 3. Which security measures?► 4. Final thoughts
  • 16. 16 Security measures are the usual ones… 16 March 2016 - Property of Solucom, all rights reserved
  • 17. 17 …but their implementation must be innovative! 16 March 2016 - Property of Solucom, all rights reserved
  • 18. 18 …but their implementation must be innovative! Various with the same OS but different battery lives Apple’s recommendations for Apple Watch developers Typing a password on a small screen would be difficult for the user. • Limited processing power Computing • Take into account the fact that communication with the connected devices is usually done with Bluetooth or NFC connections Connectivity • Possible actions strongly depend on the size, form-factor and features of the device! User Experience • Pay attention to implementation choices, e.g. for data encryption (asymmetric vs. symmetric encryption) Battery Life 16 March 2016 - Property of Solucom, all rights reserved
  • 19. 19 … and which should be prioritized • Integrate security in the early design phases. • In particular, ensure security update capabilities throughout the (possibly long) device lifecycle. • Ensure that device identities are properly managed. • Request custom hardening from the manufacturers. • Clearly define liabilities (and data ownership). • Ensure regulatory compliance. • Ensure the recommended devices have a proper security level. • Make users aware of their responsibilities. • Enforce a user charter. • Reuse previous BYOD projects. But also: Think outside the box! Create Acquire AccommodateRecommend 16 March 2016 - Property of Solucom, all rights reserved
  • 20. 20 Example of innovative security Source : PRESERVE Project, www.preserve-project.eu The car embeds a HSM, and hundreds of certificates Another use case: connected cars and roads with a strong need of both integrity and privacy The certificate used to ensure the integrity of messages is changed at a random frequency When going to the garage for tune- up, the certificates can be renewed 16 March 2016 - Property of Solucom, all rights reserved
  • 21. 21 Agenda 16 March 2016 - Property of Solucom, all rights reserved 1. At the heart of digital transformation 2. CARA: the 4 risk dimensions 3. Which security measures? 4. Final thoughts►
  • 22. 22 4 recommendations towards security for the IoT Do not secure the IoT devices like your usual IT! It is important to understand the business stakes during the whole device lifecycle, in order to clarify and anticipate possible risks. Talk with the business stakeholders MARKETING AND SALES MANUFACTURERS HUMAN RESSOURCS BOARD SUPPLY CHAIN MANAGEMENT RESEARCH AND DEVELOPMENT ADMINISTRATION LEGAL DEPARTMENT 16 March 2016 - Property of Solucom, all rights reserved
  • 23. 23 4 recommendations towards security for the IoT Do not secure the IoT devices like your usual IT! The risks of connected devices may differ depending on the usages and the setting (CARA). Furthermore, depending on your industry, the devices will not be used the same way. Clarify the use cases NOTIFICATION CONSULTATION MODIFICATION TRANSACTION Low risk High risk Examples in banking 16 March 2016 - Property of Solucom, all rights reserved
  • 24. 24 4 recommendations towards security for the IoT TIZEN PEEBLE OS OS MICRIUM ANDROID WATCH OS FREE RTOS I’M DROID Do not secure the IoT devices like your usual IT! Two relatively similar devices may not be equally secured. It becomes necessary to identify the specifics of the platforms and the associated limits. Analyze the market and the platforms 16 March 2016 - Property of Solucom, all rights reserved
  • 25. 25 4 recommendations towards security for the IoT Do not secure the IoT devices like your usual IT! Take into account the context in which connected devices evolve, as well as their characteristics: autonomy, range, user experience… Think outside the box to implement security 16 March 2016 - Property of Solucom, all rights reserved
  • 26. 26 4 recommendations towards security for the IoT It is important to understand the business stakes during the whole device lifecycle, in order to clarify and anticipate possible risks. The risks of connected devices may differ depending on the usages and the setting (CARA). Furthermore, depending on your industry, the devices will not be used the same way. Two relatively similar devices may not be equally secured. It becomes necessary to identify the specifics of the platforms and the associated limits. Take into account the context in which connected devices evolve, as well as their characteristics: autonomy, range, user experience… Analyze the market and the platforms Talk with the business stakeholders Clarify the use cases Think outside the box to implement security 16 March 2016 - Property of Solucom, all rights reserved Do not secure the IoT devices like your usual IT!
  • 27. www.solucom.fr Chadi HANTOUCHE Cybersecurity Senior Manager chadi.hantouche@solucom.sg @chadihantouche