SlideShare une entreprise Scribd logo
1  sur  34
Télécharger pour lire hors ligne
13
Ten Expert Tips on
Internet of Things Security
13
Over the last few years, Internet of Things (IoT)
is all everyone has talked about. So it comes
as no surprise, that 2016 has brought even
more talk to the industry. More products will
launch and headlines will continue to be filled
on the subject.
However, as the industry continues to rise in
popularity the more we hear about the serious
security issues pertaining to IoT
devices. I asked a few experts to
share their tips on IoT security
and how businesses can address
this challenge.
Implement a
BYOD policy.
1
Often, data breaches
are the result of
employees losing track
of company-owned
devices such as laptops,
tablets and storage
devices containing
sensitive information.
“
This problem is exacerbated by employees
using their own devices for work related tasks.
In addition to impressing upon employees the
need to keep track of their devices, businesses
should encrypt their company-owned devices
using a certified encryption methodology.
- Krishna Narine, Business Litigation Lawyer
Meredith & Narine, LLC
Source
“
It all starts with the
manufacturers.
2
Achieving security rests
less on the businesses
that use IoT devices and
more on the businesses
that manufacture them.
Manufacturers need to
design security in from
the beginning, both in
software and hardware.
“
Ultimately, success in cyber security for IoT
depends on designing in security from the
beginning in the same way that we have
achieved high reliability in areas like rail safety,
aviation safety, food safety, security of iconic
buildings (i.e. designing buildings to withstand
a blast), and so on.
- Emilian Papadopoulos, President
Good Harbor Security Risk Management
Source
“
Don’t be
in a rush.
3
Don't put all your
eggs in one basket.
Technology is
awesome, and we truly
are living in the future,
but over-reliance on
technology is a surefire
recipe for disaster.
“
IoT presents a treasure trove of personal
information, financial data, and other sensitive
information. Smart businesses and individuals
will be careful to temper their excitement and
desire to jump into this
increasingly-interconnected world of
convenience against their willingness to assume
additional risk of attack or penetration.
- Frank Spano, Executive Director
The Counterterrorism Institute
Source
“
Add on layers
of security.
4
A VPN (Virtual Private
Network) secures one's
home or business
network to allow traffic
only from verified
devices, or at least
separates the unverified
traffic out.
“
With the rise of the IOT, it is becoming easier and
easier for malicious hackers to access verified
information through these devices. While they’re
marketed as being mostly secure, it only takes
one error for someone to get access to your
entire network. Using a VPN can totally
prevent this, adding a layer of redundancy that
is so underrated in today’s world.
- Bryce Hamlin,Public Relations Coordinator
Hide.me
Source
“
Integrate security into
your development
lifecycle.
5
Companies that
produce IoT devices
need to ensure that
they have a solid
software development
lifecycle that is inclusive
of security testing.
“
By ensuring security is baked into the
development process from day one, the
company can dramatically move the needle
to help ensure the security of their devices,
while also reducing waste within the
development lifecycle.
- Andrew Storms,Vice President, Security Services
New Context
Source
“
Automation
is key.
6
Automation will be one of the
keys to increasing efficiency in
enterprise SOCs. For instance, an
automated incident response
system can identify and resolve
low-complexity, high-volume tasks
with little to no human intervention,
leaving expert security personnel
with more time to handle the more
nuanced and complicated issues.
That is critical, not only because
more devices will create more tasks,
but because attacks are growing
increasingly sophisticated.
“
Additionally, if that same platform can centralize
information from existing security tools, it
streamlines operations by limiting the number
of tools that analysts use to initially triage alerts.
And, if the platform can capture processes for
standardization and reuse, it further increases
productivity by reducing duplicate work.
- Cody Cornell,Founder and CEO
Swimlane LLC
Source
“
Integration of cyber
threat intelligence.
7
The relevance of Cyber
Threat Intelligence (CTI),
as a part of a proactive
information security
program, will become
essential for
information security.
“
It is critical for organizations to be able to identify
evolving methods and emerging technology
trends used by the cybercriminals, and then to
continually assess their capability in this regard.
Because many organizations don't have
access to internal specialists, they will need to
turn to external experts from the CTI sector.
- Mark Coderre, National Security Practice Director
OpenSky Corporation
Source
“
Security starts with
proper training.
8
Enterprises need to
approach IoT security
bottoms up by re-training
software developers:
their own and their
supply chain, ecosystem
stakeholders.
“
To avoid IoT security being an afterthought,
it is critical for the developers to start with a
full system view of the IoT solution, not just
their component alone, before they write
the first line of code.
- Prathap Dendi, General Manager
Emerging Technologies, AppDynamics
Source
“
Stop the
negligence.
9
The primary cause
of security breaches
in business remains
employee negligence
or intent and not
the malfeasance of
hackers.
“
Education and training around policies and
protocols for security is imperative to avoiding
negligent behaviors, like weak and shared
passwords or lackadaisical logouts, leading to
issues. Having clear and complete understanding
of possible vulnerabilities and limiting accessibility
of control within software and hardware
specifications and settings is of dire importance
in limiting and avoiding intentional sabotage.
- Felicite Moorman, CEO
StratIS
Source
“
Oceans of
the internet.
10
Asking how to
theft-proof electronic
information in the
Internet of things is like
asking how to protect
your ships against Pirates
and Vikings during the
11th and 12th century.
“
We gained control of pirating the moment we
gained control over the seas and oceans...In
comparison, we do not control the vast
oceans of the Internet. We do not even have
agreed-upon standards, nor even an
understanding of all the harmful capabilities of
hackers on the web.... We are still at the stage
of inventing technologies on the Internet.
- Matti Kon, President & CEO
InfoTech Solutions for Business
Source
“
Interested in learning more about the
future of IT? Check on this interactive
on the future of cloud computing.
Explore the future of cloud

Contenu connexe

Tendances

Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in ManufacturingCentraComm
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16James Rutt
 
Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Shawn Nutley
 
Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0Eryk Budi Pratama
 
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and BeyondNUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and BeyondNUS-ISS
 
Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College WorkshopRahul Nayan
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoTAmy Daly
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017NRC
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictZsolt Nemeth
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019PECB
 
Extending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office PerimeterExtending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office PerimeterVeriato
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018CheapSSLsecurity
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOlivier Busolini
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Securityinside-BigData.com
 

Tendances (19)

Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
 
Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020
 
Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0
 
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and BeyondNUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
 
Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College Workshop
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber Conflict
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
 
Extending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office PerimeterExtending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office Perimeter
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in Cybersecurity
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
 
Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
 
2019 Cybersecurity Predictions
2019 Cybersecurity Predictions2019 Cybersecurity Predictions
2019 Cybersecurity Predictions
 

En vedette

ROI Wellness Calculator Presentation (National Wellness Institute)
ROI Wellness Calculator Presentation (National Wellness Institute)ROI Wellness Calculator Presentation (National Wellness Institute)
ROI Wellness Calculator Presentation (National Wellness Institute)Joel Bennett
 
Custom code management & tools
Custom code management & toolsCustom code management & tools
Custom code management & toolsTimo_John
 
Getting into ai event slides
Getting into ai   event slidesGetting into ai   event slides
Getting into ai event slidesMatthew Miller
 
Testing in a continuous delivery world - continuous delivery Amsterdam meetup
Testing in a continuous delivery world - continuous delivery Amsterdam meetupTesting in a continuous delivery world - continuous delivery Amsterdam meetup
Testing in a continuous delivery world - continuous delivery Amsterdam meetupWouter Lagerweij
 
Why Open Source matters
Why Open Source mattersWhy Open Source matters
Why Open Source mattersMichael Schulz
 
Challenges of Community Health Workers in sustaining maternal and child healt...
Challenges of Community Health Workers in sustaining maternal and child healt...Challenges of Community Health Workers in sustaining maternal and child healt...
Challenges of Community Health Workers in sustaining maternal and child healt...REACHOUTCONSORTIUMSLIDES
 
What's new in Docker - InfraKit - Docker Meetup Berlin 2016
What's new in Docker - InfraKit - Docker Meetup Berlin 2016What's new in Docker - InfraKit - Docker Meetup Berlin 2016
What's new in Docker - InfraKit - Docker Meetup Berlin 2016Patrick Chanezon
 
LE DÉFI DE L'EXPERT ET DE L'INGÉNIEUR CHIMISTE
LE DÉFI DE L'EXPERT ET DE L'INGÉNIEUR CHIMISTELE DÉFI DE L'EXPERT ET DE L'INGÉNIEUR CHIMISTE
LE DÉFI DE L'EXPERT ET DE L'INGÉNIEUR CHIMISTEYvon Gervaise
 
The Rise of Asian Platforms: A Regional Survey
The Rise of Asian Platforms: A Regional SurveyThe Rise of Asian Platforms: A Regional Survey
The Rise of Asian Platforms: A Regional SurveyPeter C. Evans, PhD
 
Designing and Implementing your IOT Solutions with Open Source
Designing and Implementing your IOT Solutions with Open SourceDesigning and Implementing your IOT Solutions with Open Source
Designing and Implementing your IOT Solutions with Open SourceDataWorks Summit/Hadoop Summit
 
Interdiction ecobuages Hautes Pyrenees jusquau 28 février
Interdiction ecobuages Hautes Pyrenees jusquau 28 févrierInterdiction ecobuages Hautes Pyrenees jusquau 28 février
Interdiction ecobuages Hautes Pyrenees jusquau 28 févrierPhilippe Villette
 
Technological pillars to enable Smarter (Collaborative + Inclusive) Environme...
Technological pillars to enable Smarter (Collaborative + Inclusive) Environme...Technological pillars to enable Smarter (Collaborative + Inclusive) Environme...
Technological pillars to enable Smarter (Collaborative + Inclusive) Environme...Diego López-de-Ipiña González-de-Artaza
 
Infographic Protecting Patient Data
Infographic  Protecting Patient Data Infographic  Protecting Patient Data
Infographic Protecting Patient Data Fortinet
 
Lessons Learned: Using Spark and Microservices
Lessons Learned: Using Spark and MicroservicesLessons Learned: Using Spark and Microservices
Lessons Learned: Using Spark and MicroservicesAlexis Seigneurin
 
Appel a residence artistes sur le Pays des Nestes
Appel a residence artistes sur le Pays des NestesAppel a residence artistes sur le Pays des Nestes
Appel a residence artistes sur le Pays des NestesPhilippe Villette
 
Southern Connecticut State University Wins Bronze at iGEM
Southern Connecticut State University Wins Bronze at iGEMSouthern Connecticut State University Wins Bronze at iGEM
Southern Connecticut State University Wins Bronze at iGEMBarbara Malmberg, PMP
 

En vedette (20)

Industry 4.0 UK Readiness Report
Industry 4.0 UK Readiness ReportIndustry 4.0 UK Readiness Report
Industry 4.0 UK Readiness Report
 
ROI Wellness Calculator Presentation (National Wellness Institute)
ROI Wellness Calculator Presentation (National Wellness Institute)ROI Wellness Calculator Presentation (National Wellness Institute)
ROI Wellness Calculator Presentation (National Wellness Institute)
 
Twitter on Fire
Twitter on FireTwitter on Fire
Twitter on Fire
 
Custom code management & tools
Custom code management & toolsCustom code management & tools
Custom code management & tools
 
Getting into ai event slides
Getting into ai   event slidesGetting into ai   event slides
Getting into ai event slides
 
Testing in a continuous delivery world - continuous delivery Amsterdam meetup
Testing in a continuous delivery world - continuous delivery Amsterdam meetupTesting in a continuous delivery world - continuous delivery Amsterdam meetup
Testing in a continuous delivery world - continuous delivery Amsterdam meetup
 
Why Open Source matters
Why Open Source mattersWhy Open Source matters
Why Open Source matters
 
Challenges of Community Health Workers in sustaining maternal and child healt...
Challenges of Community Health Workers in sustaining maternal and child healt...Challenges of Community Health Workers in sustaining maternal and child healt...
Challenges of Community Health Workers in sustaining maternal and child healt...
 
What's new in Docker - InfraKit - Docker Meetup Berlin 2016
What's new in Docker - InfraKit - Docker Meetup Berlin 2016What's new in Docker - InfraKit - Docker Meetup Berlin 2016
What's new in Docker - InfraKit - Docker Meetup Berlin 2016
 
LE DÉFI DE L'EXPERT ET DE L'INGÉNIEUR CHIMISTE
LE DÉFI DE L'EXPERT ET DE L'INGÉNIEUR CHIMISTELE DÉFI DE L'EXPERT ET DE L'INGÉNIEUR CHIMISTE
LE DÉFI DE L'EXPERT ET DE L'INGÉNIEUR CHIMISTE
 
The Rise of Asian Platforms: A Regional Survey
The Rise of Asian Platforms: A Regional SurveyThe Rise of Asian Platforms: A Regional Survey
The Rise of Asian Platforms: A Regional Survey
 
Designing and Implementing your IOT Solutions with Open Source
Designing and Implementing your IOT Solutions with Open SourceDesigning and Implementing your IOT Solutions with Open Source
Designing and Implementing your IOT Solutions with Open Source
 
An update on the UK research based pharmaceutical industry
An update on the UK research based pharmaceutical industryAn update on the UK research based pharmaceutical industry
An update on the UK research based pharmaceutical industry
 
Interdiction ecobuages Hautes Pyrenees jusquau 28 février
Interdiction ecobuages Hautes Pyrenees jusquau 28 févrierInterdiction ecobuages Hautes Pyrenees jusquau 28 février
Interdiction ecobuages Hautes Pyrenees jusquau 28 février
 
Technological pillars to enable Smarter (Collaborative + Inclusive) Environme...
Technological pillars to enable Smarter (Collaborative + Inclusive) Environme...Technological pillars to enable Smarter (Collaborative + Inclusive) Environme...
Technological pillars to enable Smarter (Collaborative + Inclusive) Environme...
 
Infographic Protecting Patient Data
Infographic  Protecting Patient Data Infographic  Protecting Patient Data
Infographic Protecting Patient Data
 
Diamandis : Top10 Tech Trends.
Diamandis : Top10 Tech Trends.Diamandis : Top10 Tech Trends.
Diamandis : Top10 Tech Trends.
 
Lessons Learned: Using Spark and Microservices
Lessons Learned: Using Spark and MicroservicesLessons Learned: Using Spark and Microservices
Lessons Learned: Using Spark and Microservices
 
Appel a residence artistes sur le Pays des Nestes
Appel a residence artistes sur le Pays des NestesAppel a residence artistes sur le Pays des Nestes
Appel a residence artistes sur le Pays des Nestes
 
Southern Connecticut State University Wins Bronze at iGEM
Southern Connecticut State University Wins Bronze at iGEMSouthern Connecticut State University Wins Bronze at iGEM
Southern Connecticut State University Wins Bronze at iGEM
 

Similaire à Ten Expert Tips on Internet of Things Security

FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliverMadison Oliver
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_finalChristopher Wang
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security smallHenry Worth
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesIRJET Journal
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economyaccenture
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber securityCarol Meng-Shih Wang
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecurityCigniti Technologies Ltd
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemBernard Marr
 
Ten Security Essentials for CIOs
Ten Security Essentials for CIOsTen Security Essentials for CIOs
Ten Security Essentials for CIOsIBM Security
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security smallHenry Worth
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprisesTaranggg11
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
 

Similaire à Ten Expert Tips on Internet of Things Security (20)

FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliver
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economy
 
Looking into the future of security
Looking into the future of securityLooking into the future of security
Looking into the future of security
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data Problem
 
Ten Security Essentials for CIOs
Ten Security Essentials for CIOsTen Security Essentials for CIOs
Ten Security Essentials for CIOs
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Forensics
ForensicsForensics
Forensics
 

Plus de Dean Bonehill ♠Technology for Business♠

Business in the Community : A Brave New World BITC Accenture Report November ...
Business in the Community : A Brave New World BITC Accenture Report November ...Business in the Community : A Brave New World BITC Accenture Report November ...
Business in the Community : A Brave New World BITC Accenture Report November ...Dean Bonehill ♠Technology for Business♠
 

Plus de Dean Bonehill ♠Technology for Business♠ (20)

Deloitte millenial survey-2016-exec-summary
Deloitte millenial survey-2016-exec-summaryDeloitte millenial survey-2016-exec-summary
Deloitte millenial survey-2016-exec-summary
 
WEF Future of Jobs 2018
WEF Future of Jobs 2018WEF Future of Jobs 2018
WEF Future of Jobs 2018
 
Future of-employment
Future of-employmentFuture of-employment
Future of-employment
 
Intel he rise-of-multi-access-edge-computing-paper
Intel he rise-of-multi-access-edge-computing-paperIntel he rise-of-multi-access-edge-computing-paper
Intel he rise-of-multi-access-edge-computing-paper
 
Leading from-the-front-ceo-research
Leading from-the-front-ceo-researchLeading from-the-front-ceo-research
Leading from-the-front-ceo-research
 
2017 06 current analysis - uk data wan
2017 06   current analysis - uk data wan2017 06   current analysis - uk data wan
2017 06 current analysis - uk data wan
 
GDPR Preparing for-the-gdpr-12-steps
GDPR Preparing for-the-gdpr-12-stepsGDPR Preparing for-the-gdpr-12-steps
GDPR Preparing for-the-gdpr-12-steps
 
How Google Works
How Google WorksHow Google Works
How Google Works
 
Dynamic network services whitepaper external final
Dynamic network services whitepaper external finalDynamic network services whitepaper external final
Dynamic network services whitepaper external final
 
Industrial Strategy 10 Pillars
Industrial Strategy 10 PillarsIndustrial Strategy 10 Pillars
Industrial Strategy 10 Pillars
 
Artificial Intelligence Automation Economy
Artificial Intelligence Automation EconomyArtificial Intelligence Automation Economy
Artificial Intelligence Automation Economy
 
The New-Wave of Artificial Intelligence : Labs Whitepaper
The New-Wave of Artificial Intelligence : Labs WhitepaperThe New-Wave of Artificial Intelligence : Labs Whitepaper
The New-Wave of Artificial Intelligence : Labs Whitepaper
 
WEF : A Blueprint for Digital Iidentity
WEF : A Blueprint for Digital IidentityWEF : A Blueprint for Digital Iidentity
WEF : A Blueprint for Digital Iidentity
 
Deloitte disruption ahead IBM Watson
Deloitte disruption ahead IBM WatsonDeloitte disruption ahead IBM Watson
Deloitte disruption ahead IBM Watson
 
CIO Agenda Insights 2016
CIO Agenda Insights 2016CIO Agenda Insights 2016
CIO Agenda Insights 2016
 
Big Data Predictions ebook
Big Data Predictions ebookBig Data Predictions ebook
Big Data Predictions ebook
 
Business in the Community : A Brave New World BITC Accenture Report November ...
Business in the Community : A Brave New World BITC Accenture Report November ...Business in the Community : A Brave New World BITC Accenture Report November ...
Business in the Community : A Brave New World BITC Accenture Report November ...
 
Demystifying the cloud
Demystifying the cloudDemystifying the cloud
Demystifying the cloud
 
Microsoft Buys Linkedin Public Presentation
Microsoft Buys Linkedin Public PresentationMicrosoft Buys Linkedin Public Presentation
Microsoft Buys Linkedin Public Presentation
 
IDC FutureScape : Worldwide Internet of Things 2017 Predictions.
IDC FutureScape : Worldwide Internet of Things 2017 Predictions.IDC FutureScape : Worldwide Internet of Things 2017 Predictions.
IDC FutureScape : Worldwide Internet of Things 2017 Predictions.
 

Dernier

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 

Dernier (20)

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 

Ten Expert Tips on Internet of Things Security

  • 1. 13 Ten Expert Tips on Internet of Things Security
  • 2. 13 Over the last few years, Internet of Things (IoT) is all everyone has talked about. So it comes as no surprise, that 2016 has brought even more talk to the industry. More products will launch and headlines will continue to be filled on the subject.
  • 3. However, as the industry continues to rise in popularity the more we hear about the serious security issues pertaining to IoT devices. I asked a few experts to share their tips on IoT security and how businesses can address this challenge.
  • 5. Often, data breaches are the result of employees losing track of company-owned devices such as laptops, tablets and storage devices containing sensitive information. “
  • 6. This problem is exacerbated by employees using their own devices for work related tasks. In addition to impressing upon employees the need to keep track of their devices, businesses should encrypt their company-owned devices using a certified encryption methodology. - Krishna Narine, Business Litigation Lawyer Meredith & Narine, LLC Source “
  • 7. It all starts with the manufacturers. 2
  • 8. Achieving security rests less on the businesses that use IoT devices and more on the businesses that manufacture them. Manufacturers need to design security in from the beginning, both in software and hardware. “
  • 9. Ultimately, success in cyber security for IoT depends on designing in security from the beginning in the same way that we have achieved high reliability in areas like rail safety, aviation safety, food safety, security of iconic buildings (i.e. designing buildings to withstand a blast), and so on. - Emilian Papadopoulos, President Good Harbor Security Risk Management Source “
  • 10. Don’t be in a rush. 3
  • 11. Don't put all your eggs in one basket. Technology is awesome, and we truly are living in the future, but over-reliance on technology is a surefire recipe for disaster. “
  • 12. IoT presents a treasure trove of personal information, financial data, and other sensitive information. Smart businesses and individuals will be careful to temper their excitement and desire to jump into this increasingly-interconnected world of convenience against their willingness to assume additional risk of attack or penetration. - Frank Spano, Executive Director The Counterterrorism Institute Source “
  • 13. Add on layers of security. 4
  • 14. A VPN (Virtual Private Network) secures one's home or business network to allow traffic only from verified devices, or at least separates the unverified traffic out. “
  • 15. With the rise of the IOT, it is becoming easier and easier for malicious hackers to access verified information through these devices. While they’re marketed as being mostly secure, it only takes one error for someone to get access to your entire network. Using a VPN can totally prevent this, adding a layer of redundancy that is so underrated in today’s world. - Bryce Hamlin,Public Relations Coordinator Hide.me Source “
  • 16. Integrate security into your development lifecycle. 5
  • 17. Companies that produce IoT devices need to ensure that they have a solid software development lifecycle that is inclusive of security testing. “
  • 18. By ensuring security is baked into the development process from day one, the company can dramatically move the needle to help ensure the security of their devices, while also reducing waste within the development lifecycle. - Andrew Storms,Vice President, Security Services New Context Source “
  • 20. Automation will be one of the keys to increasing efficiency in enterprise SOCs. For instance, an automated incident response system can identify and resolve low-complexity, high-volume tasks with little to no human intervention, leaving expert security personnel with more time to handle the more nuanced and complicated issues. That is critical, not only because more devices will create more tasks, but because attacks are growing increasingly sophisticated. “
  • 21. Additionally, if that same platform can centralize information from existing security tools, it streamlines operations by limiting the number of tools that analysts use to initially triage alerts. And, if the platform can capture processes for standardization and reuse, it further increases productivity by reducing duplicate work. - Cody Cornell,Founder and CEO Swimlane LLC Source “
  • 22. Integration of cyber threat intelligence. 7
  • 23. The relevance of Cyber Threat Intelligence (CTI), as a part of a proactive information security program, will become essential for information security. “
  • 24. It is critical for organizations to be able to identify evolving methods and emerging technology trends used by the cybercriminals, and then to continually assess their capability in this regard. Because many organizations don't have access to internal specialists, they will need to turn to external experts from the CTI sector. - Mark Coderre, National Security Practice Director OpenSky Corporation Source “
  • 26. Enterprises need to approach IoT security bottoms up by re-training software developers: their own and their supply chain, ecosystem stakeholders. “
  • 27. To avoid IoT security being an afterthought, it is critical for the developers to start with a full system view of the IoT solution, not just their component alone, before they write the first line of code. - Prathap Dendi, General Manager Emerging Technologies, AppDynamics Source “
  • 29. The primary cause of security breaches in business remains employee negligence or intent and not the malfeasance of hackers. “
  • 30. Education and training around policies and protocols for security is imperative to avoiding negligent behaviors, like weak and shared passwords or lackadaisical logouts, leading to issues. Having clear and complete understanding of possible vulnerabilities and limiting accessibility of control within software and hardware specifications and settings is of dire importance in limiting and avoiding intentional sabotage. - Felicite Moorman, CEO StratIS Source “
  • 32. Asking how to theft-proof electronic information in the Internet of things is like asking how to protect your ships against Pirates and Vikings during the 11th and 12th century. “
  • 33. We gained control of pirating the moment we gained control over the seas and oceans...In comparison, we do not control the vast oceans of the Internet. We do not even have agreed-upon standards, nor even an understanding of all the harmful capabilities of hackers on the web.... We are still at the stage of inventing technologies on the Internet. - Matti Kon, President & CEO InfoTech Solutions for Business Source “
  • 34. Interested in learning more about the future of IT? Check on this interactive on the future of cloud computing. Explore the future of cloud