SlideShare une entreprise Scribd logo
1  sur  34
Télécharger pour lire hors ligne
© Copyright 2015 Hildebrand Technology Limited
Security and Privacy
Overcoming concerns to unlock potential
Nimbus Ninety
IGNITE Seminar
November 2015
Joshua Cooper
Hildebrand Technology Limited
jcooper@hildebrand.co.uk
@HildebrandTech #IoT
© Copyright 2015 Hildebrand Technology Limited
Let’s talk Privacy
then Security
© Copyright 2015 Hildebrand Technology Limited
IoT is
not quite the Internet
not quite Things
Sweeping Statement No. 1
Light
Quality
Air Temp
Occupancy
Appliance Function
© Copyright 2015 Hildebrand Technology Limited
sense actuate
intelligence
IoT Promise
© Copyright 2015 Hildebrand Technology Limited
not a commodity
and
refined petrol is value
“IoT Big Data Oil”
© Copyright 2015 Hildebrand Technology Limited
© Copyright 2015 Hildebrand Technology Limited
Streamed power reads
Bill estimation and forecast
Prepaid (and remaining) balance
Consumption graphs (day/wk/mth/yr)
Comparisons
CO2
Appliance monitoring and control
Weather
Messages
Feedback Form
[Competitions]
Smart Meter Application
Page1Howz
© Intelesant Ltd 2014 Private and confidential
The Solution
Howz
© Intelesant Ltd 2014 Private and confidential
Family
GP
Social services
Collect Process Notify
Sensors and hub
Web, mobile and API
Knowledge base
Statistics Events Patterns Exceptions Alerts
Electricity
Heat
Door
Visits and deliveries
Checklist
Care network
Occupational
Physiotherapy
Geriatrics
Elderly person
Web, mobile and API
Howz platform combines machine, human observation and expert knowledge
The Platform
Shopping Basket
© Copyright 2014 Hildebrand Technology Limited
Where do people go?
What do they do?
How long do they stay?
Cameras and door counters lack
actionable information
3 6
© Copyright 2014 Hildebrand Technology Limited
We use “big data” and “machine learning” to
understand movement,
predict use and discover
opportunities
Our People in Places (PIP
TM
) technology operates in real-
time using advanced spatio-temporal statistical analysis
I work
here I eat
here
I like
books
My
local
cinema
I meet
friends
I am in
and out
© Copyright 2015 Hildebrand Technology Limited
people, places
goods and resources
(not really about the devices)
“Things”
© Copyright 2015 Hildebrand Technology Limited
Google cars
Artificial intelligence
(cyber physical systems) =
liability
“What about …”
© Copyright 2015 Hildebrand Technology Limited
GDPR
General Data Protection Regulation
(harmonised EU Data Protection)
Sweeping Change
© Copyright 2015 Hildebrand Technology Limited
Lack of control and
information asymmetry
Privacy Challenge 1
© Copyright 2015 Hildebrand Technology Limited
Quality of user’s
consent
Privacy Challenge 2
© Copyright 2015 Hildebrand Technology Limited
Inference and repurposing
of original data
Privacy Challenge 3
© Copyright 2015 Hildebrand Technology Limited
Intrusive identification of
behaviour patterns and
profiling
Privacy Challenge 4
© Copyright 2015 Hildebrand Technology Limited
Limitation on possibility
of remaining anonymous
Privacy Challenge 5
© Copyright 2015 Hildebrand Technology Limited
Security is the
unplanned risk
Privacy Challenge 6
© Copyright 2015 Hildebrand Technology Limited
Fines
2%-5% of global
turnover*
“Why do I care …”
© Copyright 2015 Hildebrand Technology Limited
Goal posts are moving
2017 - 2019
“When do I care …”
© Copyright 2015 Hildebrand Technology Limited
ISO27001
Integration of Security and
Privacy
Strategies for Success
© Copyright 2015 Hildebrand Technology Limited
Data Protection
Officer
Strategy 1
© Copyright 2015 Hildebrand Technology Limited
Privacy Impact
Assessment
Strategy 2
© Copyright 2015 Hildebrand Technology Limited
Privacy by Design
Strategy 3
© Copyright 2015 Hildebrand Technology Limited
Put the Data Subject
first
Strategy 4
© Copyright 2015 Hildebrand Technology Limited
Include Privacy and
Security in New Product
Development
Strategy 5
© Copyright 2015 Hildebrand Technology Limited
Actuators are the most
interesting, but present
different challenges
Sweeping Statement No. 4
© Copyright 2015 Hildebrand Technology Limited
Joshua Cooper
Hildebrand Technology Limited
jcooper@hildebrand.co.uk
@HildebrandTech
#IoT

Contenu connexe

Tendances

A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greenebmcmenemy
 
AllThingstalk presenting at Microsoft Innovation Center
AllThingstalk presenting at Microsoft Innovation CenterAllThingstalk presenting at Microsoft Innovation Center
AllThingstalk presenting at Microsoft Innovation CenterStefaan Top
 
What changes for Internet of Things technologies with the EU Data Protection ...
What changes for Internet of Things technologies with the EU Data Protection ...What changes for Internet of Things technologies with the EU Data Protection ...
What changes for Internet of Things technologies with the EU Data Protection ...Giulio Coraggio
 
Edge patterns in the IIoT
Edge patterns in the IIoTEdge patterns in the IIoT
Edge patterns in the IIoTBrad Nicholas
 
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)IoT613
 
IoT: 3 keys to handling the oncoming barrage of use cases
 IoT: 3 keys to handling the oncoming barrage of use cases IoT: 3 keys to handling the oncoming barrage of use cases
IoT: 3 keys to handling the oncoming barrage of use casesAbhishek Sood
 
The Definitive Guide to IoT for Business
The Definitive Guide to IoT for BusinessThe Definitive Guide to IoT for Business
The Definitive Guide to IoT for BusinessAeris
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldBrad Nicholas
 
Internet of Things in Business: Applications & Potential Benefits
Internet of Things in Business: Applications & Potential BenefitsInternet of Things in Business: Applications & Potential Benefits
Internet of Things in Business: Applications & Potential BenefitsR-Style Lab
 
Industrial IoT in Iran Oil & Gas
Industrial IoT in Iran Oil & GasIndustrial IoT in Iran Oil & Gas
Industrial IoT in Iran Oil & GasFarzin Fardiss
 
Digital Communities and the Internet of Everything
Digital Communities and the Internet of EverythingDigital Communities and the Internet of Everything
Digital Communities and the Internet of EverythingConnected Futures
 
You Sold Your First 1,000 Devices? Now What?
You Sold Your First 1,000 Devices? Now What?You Sold Your First 1,000 Devices? Now What?
You Sold Your First 1,000 Devices? Now What?Aeris
 
Presentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise ArchitecturePresentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise ArchitectureFrancisco Maroto
 
MIConnect "Make IoT ideas happen" part 1
MIConnect "Make IoT ideas happen" part 1 MIConnect "Make IoT ideas happen" part 1
MIConnect "Make IoT ideas happen" part 1 D3 Consutling
 
The Incredible Ways Shell Uses Artificial Intelligence To Help Transform The ...
The Incredible Ways Shell Uses Artificial Intelligence To Help Transform The ...The Incredible Ways Shell Uses Artificial Intelligence To Help Transform The ...
The Incredible Ways Shell Uses Artificial Intelligence To Help Transform The ...Bernard Marr
 
Accelerate IoT with Bridgera
Accelerate IoT with Bridgera Accelerate IoT with Bridgera
Accelerate IoT with Bridgera Ron Pascuzzi
 
The Analytics Value Chain - Key to Delivering Business Value in IoT
The Analytics Value Chain - Key to Delivering Business Value in IoTThe Analytics Value Chain - Key to Delivering Business Value in IoT
The Analytics Value Chain - Key to Delivering Business Value in IoTPeter Nguyen
 

Tendances (18)

A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
 
AllThingstalk presenting at Microsoft Innovation Center
AllThingstalk presenting at Microsoft Innovation CenterAllThingstalk presenting at Microsoft Innovation Center
AllThingstalk presenting at Microsoft Innovation Center
 
What changes for Internet of Things technologies with the EU Data Protection ...
What changes for Internet of Things technologies with the EU Data Protection ...What changes for Internet of Things technologies with the EU Data Protection ...
What changes for Internet of Things technologies with the EU Data Protection ...
 
Edge patterns in the IIoT
Edge patterns in the IIoTEdge patterns in the IIoT
Edge patterns in the IIoT
 
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
 
IoT: 3 keys to handling the oncoming barrage of use cases
 IoT: 3 keys to handling the oncoming barrage of use cases IoT: 3 keys to handling the oncoming barrage of use cases
IoT: 3 keys to handling the oncoming barrage of use cases
 
The Definitive Guide to IoT for Business
The Definitive Guide to IoT for BusinessThe Definitive Guide to IoT for Business
The Definitive Guide to IoT for Business
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
The fourth industrial revolution
The fourth industrial revolutionThe fourth industrial revolution
The fourth industrial revolution
 
Internet of Things in Business: Applications & Potential Benefits
Internet of Things in Business: Applications & Potential BenefitsInternet of Things in Business: Applications & Potential Benefits
Internet of Things in Business: Applications & Potential Benefits
 
Industrial IoT in Iran Oil & Gas
Industrial IoT in Iran Oil & GasIndustrial IoT in Iran Oil & Gas
Industrial IoT in Iran Oil & Gas
 
Digital Communities and the Internet of Everything
Digital Communities and the Internet of EverythingDigital Communities and the Internet of Everything
Digital Communities and the Internet of Everything
 
You Sold Your First 1,000 Devices? Now What?
You Sold Your First 1,000 Devices? Now What?You Sold Your First 1,000 Devices? Now What?
You Sold Your First 1,000 Devices? Now What?
 
Presentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise ArchitecturePresentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise Architecture
 
MIConnect "Make IoT ideas happen" part 1
MIConnect "Make IoT ideas happen" part 1 MIConnect "Make IoT ideas happen" part 1
MIConnect "Make IoT ideas happen" part 1
 
The Incredible Ways Shell Uses Artificial Intelligence To Help Transform The ...
The Incredible Ways Shell Uses Artificial Intelligence To Help Transform The ...The Incredible Ways Shell Uses Artificial Intelligence To Help Transform The ...
The Incredible Ways Shell Uses Artificial Intelligence To Help Transform The ...
 
Accelerate IoT with Bridgera
Accelerate IoT with Bridgera Accelerate IoT with Bridgera
Accelerate IoT with Bridgera
 
The Analytics Value Chain - Key to Delivering Business Value in IoT
The Analytics Value Chain - Key to Delivering Business Value in IoTThe Analytics Value Chain - Key to Delivering Business Value in IoT
The Analytics Value Chain - Key to Delivering Business Value in IoT
 

Similaire à IoT: Security & Privacy at IGNITE 2015

2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation CenterForgeRock
 
Internet of Things and new security challenges for the IT industry
Internet of Things and new security challenges for the IT industryInternet of Things and new security challenges for the IT industry
Internet of Things and new security challenges for the IT industryMartin von Haller Groenbaek
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
How IoT will change our world, and how to start building it - Digital Futures...
How IoT will change our world, and how to start building it - Digital Futures...How IoT will change our world, and how to start building it - Digital Futures...
How IoT will change our world, and how to start building it - Digital Futures...Ovum
 
Report the whole IoT r0.0.pptx
Report   the whole IoT r0.0.pptxReport   the whole IoT r0.0.pptx
Report the whole IoT r0.0.pptxoldmanegan
 
Rising Above the Tide of Emerging Technologies
Rising Above the Tide of Emerging TechnologiesRising Above the Tide of Emerging Technologies
Rising Above the Tide of Emerging TechnologiesFrontRange
 
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene
 
Data Economy_FINTECHBELGIUM_15062023_DV_for publishing_ok.pptx
Data Economy_FINTECHBELGIUM_15062023_DV_for publishing_ok.pptxData Economy_FINTECHBELGIUM_15062023_DV_for publishing_ok.pptx
Data Economy_FINTECHBELGIUM_15062023_DV_for publishing_ok.pptxFinTech Belgium
 
Digital Disruption Across Tomorrow's Manufacturing Supply Chains
Digital Disruption Across Tomorrow's Manufacturing Supply ChainsDigital Disruption Across Tomorrow's Manufacturing Supply Chains
Digital Disruption Across Tomorrow's Manufacturing Supply ChainsMark Morley, MBA
 
Sqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch WebinarSqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch WebinarSqrrl
 
End-to-end solution demonstration: From concept to delivery-Intel/IBM
End-to-end solution demonstration: From concept to delivery-Intel/IBMEnd-to-end solution demonstration: From concept to delivery-Intel/IBM
End-to-end solution demonstration: From concept to delivery-Intel/IBMIBM_Info_Management
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
Bt idc event cloud adoption in ireland
Bt  idc event cloud adoption in irelandBt  idc event cloud adoption in ireland
Bt idc event cloud adoption in irelandFiona Sexton
 
Phil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of viewPhil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of viewVeritas Technologies LLC
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
 
ALM Octane with GDPR
ALM Octane with GDPRALM Octane with GDPR
ALM Octane with GDPRMarleen Kock
 
IOT and Big Data - The Perfect Marriage
IOT and Big Data - The Perfect MarriageIOT and Big Data - The Perfect Marriage
IOT and Big Data - The Perfect MarriageDr. Mazlan Abbas
 
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillTheAnfieldGroup
 

Similaire à IoT: Security & Privacy at IGNITE 2015 (20)

2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center
 
Internet of Things and new security challenges for the IT industry
Internet of Things and new security challenges for the IT industryInternet of Things and new security challenges for the IT industry
Internet of Things and new security challenges for the IT industry
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
How IoT will change our world, and how to start building it - Digital Futures...
How IoT will change our world, and how to start building it - Digital Futures...How IoT will change our world, and how to start building it - Digital Futures...
How IoT will change our world, and how to start building it - Digital Futures...
 
Report the whole IoT r0.0.pptx
Report   the whole IoT r0.0.pptxReport   the whole IoT r0.0.pptx
Report the whole IoT r0.0.pptx
 
Rising Above the Tide of Emerging Technologies
Rising Above the Tide of Emerging TechnologiesRising Above the Tide of Emerging Technologies
Rising Above the Tide of Emerging Technologies
 
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
 
CyberSecurity_for_the_IoT
CyberSecurity_for_the_IoTCyberSecurity_for_the_IoT
CyberSecurity_for_the_IoT
 
Data Economy_FINTECHBELGIUM_15062023_DV_for publishing_ok.pptx
Data Economy_FINTECHBELGIUM_15062023_DV_for publishing_ok.pptxData Economy_FINTECHBELGIUM_15062023_DV_for publishing_ok.pptx
Data Economy_FINTECHBELGIUM_15062023_DV_for publishing_ok.pptx
 
Digital Disruption Across Tomorrow's Manufacturing Supply Chains
Digital Disruption Across Tomorrow's Manufacturing Supply ChainsDigital Disruption Across Tomorrow's Manufacturing Supply Chains
Digital Disruption Across Tomorrow's Manufacturing Supply Chains
 
Sqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch WebinarSqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch Webinar
 
End-to-end solution demonstration: From concept to delivery-Intel/IBM
End-to-end solution demonstration: From concept to delivery-Intel/IBMEnd-to-end solution demonstration: From concept to delivery-Intel/IBM
End-to-end solution demonstration: From concept to delivery-Intel/IBM
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
ISG Market Update
ISG Market UpdateISG Market Update
ISG Market Update
 
Bt idc event cloud adoption in ireland
Bt  idc event cloud adoption in irelandBt  idc event cloud adoption in ireland
Bt idc event cloud adoption in ireland
 
Phil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of viewPhil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of view
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
ALM Octane with GDPR
ALM Octane with GDPRALM Octane with GDPR
ALM Octane with GDPR
 
IOT and Big Data - The Perfect Marriage
IOT and Big Data - The Perfect MarriageIOT and Big Data - The Perfect Marriage
IOT and Big Data - The Perfect Marriage
 
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
 

Dernier

Principles and Practices of Data Visualization
Principles and Practices of Data VisualizationPrinciples and Practices of Data Visualization
Principles and Practices of Data VisualizationKianJazayeri1
 
Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our WorldEduminds Learning
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Boston Institute of Analytics
 
What To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxWhat To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxSimranPal17
 
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptxThe Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptxTasha Penwell
 
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Boston Institute of Analytics
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 217djon017
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...Amil Baba Dawood bangali
 
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBoston Institute of Analytics
 
Digital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksDigital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksdeepakthakur548787
 
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesConf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesTimothy Spann
 
INTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processingINTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processingsocarem879
 
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Boston Institute of Analytics
 
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Milind Agarwal
 
Decoding Patterns: Customer Churn Prediction Data Analysis Project
Decoding Patterns: Customer Churn Prediction Data Analysis ProjectDecoding Patterns: Customer Churn Prediction Data Analysis Project
Decoding Patterns: Customer Churn Prediction Data Analysis ProjectBoston Institute of Analytics
 
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...Dr Arash Najmaei ( Phd., MBA, BSc)
 
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...KarteekMane1
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPTBoston Institute of Analytics
 
Networking Case Study prepared by teacher.pptx
Networking Case Study prepared by teacher.pptxNetworking Case Study prepared by teacher.pptx
Networking Case Study prepared by teacher.pptxHimangsuNath
 

Dernier (20)

Principles and Practices of Data Visualization
Principles and Practices of Data VisualizationPrinciples and Practices of Data Visualization
Principles and Practices of Data Visualization
 
Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our World
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
 
What To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxWhat To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptx
 
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptxThe Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
 
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
 
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
 
Digital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksDigital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing works
 
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesConf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
 
INTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processingINTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processing
 
Insurance Churn Prediction Data Analysis Project
Insurance Churn Prediction Data Analysis ProjectInsurance Churn Prediction Data Analysis Project
Insurance Churn Prediction Data Analysis Project
 
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
 
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
 
Decoding Patterns: Customer Churn Prediction Data Analysis Project
Decoding Patterns: Customer Churn Prediction Data Analysis ProjectDecoding Patterns: Customer Churn Prediction Data Analysis Project
Decoding Patterns: Customer Churn Prediction Data Analysis Project
 
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
 
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
 
Networking Case Study prepared by teacher.pptx
Networking Case Study prepared by teacher.pptxNetworking Case Study prepared by teacher.pptx
Networking Case Study prepared by teacher.pptx
 

IoT: Security & Privacy at IGNITE 2015

  • 1. © Copyright 2015 Hildebrand Technology Limited Security and Privacy Overcoming concerns to unlock potential Nimbus Ninety IGNITE Seminar November 2015 Joshua Cooper Hildebrand Technology Limited jcooper@hildebrand.co.uk @HildebrandTech #IoT
  • 2. © Copyright 2015 Hildebrand Technology Limited Let’s talk Privacy then Security
  • 3. © Copyright 2015 Hildebrand Technology Limited IoT is not quite the Internet not quite Things Sweeping Statement No. 1
  • 5. © Copyright 2015 Hildebrand Technology Limited sense actuate intelligence IoT Promise
  • 6.
  • 7. © Copyright 2015 Hildebrand Technology Limited not a commodity and refined petrol is value “IoT Big Data Oil”
  • 8. © Copyright 2015 Hildebrand Technology Limited
  • 9. © Copyright 2015 Hildebrand Technology Limited Streamed power reads Bill estimation and forecast Prepaid (and remaining) balance Consumption graphs (day/wk/mth/yr) Comparisons CO2 Appliance monitoring and control Weather Messages Feedback Form [Competitions] Smart Meter Application
  • 10. Page1Howz © Intelesant Ltd 2014 Private and confidential The Solution
  • 11. Howz © Intelesant Ltd 2014 Private and confidential Family GP Social services Collect Process Notify Sensors and hub Web, mobile and API Knowledge base Statistics Events Patterns Exceptions Alerts Electricity Heat Door Visits and deliveries Checklist Care network Occupational Physiotherapy Geriatrics Elderly person Web, mobile and API Howz platform combines machine, human observation and expert knowledge The Platform Shopping Basket
  • 12. © Copyright 2014 Hildebrand Technology Limited Where do people go? What do they do? How long do they stay? Cameras and door counters lack actionable information 3 6
  • 13. © Copyright 2014 Hildebrand Technology Limited We use “big data” and “machine learning” to understand movement, predict use and discover opportunities Our People in Places (PIP TM ) technology operates in real- time using advanced spatio-temporal statistical analysis I work here I eat here I like books My local cinema I meet friends I am in and out
  • 14.
  • 15.
  • 16. © Copyright 2015 Hildebrand Technology Limited people, places goods and resources (not really about the devices) “Things”
  • 17. © Copyright 2015 Hildebrand Technology Limited Google cars Artificial intelligence (cyber physical systems) = liability “What about …”
  • 18. © Copyright 2015 Hildebrand Technology Limited GDPR General Data Protection Regulation (harmonised EU Data Protection) Sweeping Change
  • 19. © Copyright 2015 Hildebrand Technology Limited Lack of control and information asymmetry Privacy Challenge 1
  • 20. © Copyright 2015 Hildebrand Technology Limited Quality of user’s consent Privacy Challenge 2
  • 21. © Copyright 2015 Hildebrand Technology Limited Inference and repurposing of original data Privacy Challenge 3
  • 22. © Copyright 2015 Hildebrand Technology Limited Intrusive identification of behaviour patterns and profiling Privacy Challenge 4
  • 23. © Copyright 2015 Hildebrand Technology Limited Limitation on possibility of remaining anonymous Privacy Challenge 5
  • 24. © Copyright 2015 Hildebrand Technology Limited Security is the unplanned risk Privacy Challenge 6
  • 25. © Copyright 2015 Hildebrand Technology Limited Fines 2%-5% of global turnover* “Why do I care …”
  • 26. © Copyright 2015 Hildebrand Technology Limited Goal posts are moving 2017 - 2019 “When do I care …”
  • 27. © Copyright 2015 Hildebrand Technology Limited ISO27001 Integration of Security and Privacy Strategies for Success
  • 28. © Copyright 2015 Hildebrand Technology Limited Data Protection Officer Strategy 1
  • 29. © Copyright 2015 Hildebrand Technology Limited Privacy Impact Assessment Strategy 2
  • 30. © Copyright 2015 Hildebrand Technology Limited Privacy by Design Strategy 3
  • 31. © Copyright 2015 Hildebrand Technology Limited Put the Data Subject first Strategy 4
  • 32. © Copyright 2015 Hildebrand Technology Limited Include Privacy and Security in New Product Development Strategy 5
  • 33. © Copyright 2015 Hildebrand Technology Limited Actuators are the most interesting, but present different challenges Sweeping Statement No. 4
  • 34. © Copyright 2015 Hildebrand Technology Limited Joshua Cooper Hildebrand Technology Limited jcooper@hildebrand.co.uk @HildebrandTech #IoT