SlideShare a Scribd company logo
1 of 37
Download to read offline
SESSION ID:SESSION ID:
#RSAC
Jennifer Minella, CISSP
Expert Mobility: Managing the Wi-Fi
World of Wearables, Sensors and IoT
STR-R11
VP of Engineering
Carolina Advanced Digital, Inc.
www.cadinc.com and www.SecurityUncorked.com
@jjx on Twitter
#RSAC
Expert Mobility: Managing the Wi-Fi World of
Wearables, Sensors and IoT
2
Today’s connected enterprise relies on mobility for everything from
guest services to tracking user behavior. As trends in IoT grow, the
requirements of your network morph to a mobile-first environment
where availability, security and quality are key to delivering reliable
services with appropriate security from today’s threats.
IoT devices and networks have unique needs, often in contradiction to
traditional WLAN endpoints.
The needs are discussed and contrasted in terms of wireless Quality,
Security, and Availability.
#RSAC
Quality – Security – Availability
Trends in Traditional WLANs
A two-minute overview to set the stage
Traditional Wi-Fi needs for quality, security, and
availability are tailored to the current endpoints and
applications.
• Quality:
Bandwidth, Speed, Capacity,
Capability
• Security:
Accessed resources, Access
medium, Users/Devices
• Availability:
Uptime, Coverage, Capacity
#RSAC
Defining IoT
The past, the present, the future, and why IoT will affect every
enterprise in the next three years
IoT has a past, present, and future and it’s more
than just “lots of connected things.”
Things Wi-Fi
connected that
traditionally were
not.
Things Wi-Fi connected
that maybe shouldn’t be.
Our “hold my beer and
watch this” era.
Complex wireless ecosystem with
billions of connected devices,
and machine-to-machine data
sharing and analytics.
Industries and applications for IoT
Other industries using IoT:
Manufacturing
Transportation
Defense
Agriculture & Food Service
Infrastructure
Retail
Logistics
Banks
Utilities and power
Smart Buildings
Hospitality
Healthcare
41%
CAGR-
total IoT
devices
installed
#RSAC
Recursion: Trends and Cycles in
Computing
A brief look at the cyclic nature of technology trends and their
impact on IoT
We’ve Been Here Before…
Heavy -> light -> heavy
(applications, wireless, endpoints)
Centralized -> distributed -> centralized
(computing, clients, intelligence)
Divergent -> converged -> divergent
(RF, medium)
50-year progression to inter-
connectedness
#RSAC
Other Current Tech Trends Affecting IoT
Consumerization
proliferation of connected devices for home, personal use, quantified
self- reflected in commercial applications, monitors, sensors
Smart-things
not only Internet connected but usually machine-to-machine with
peers and central analytics, drives data, cloud, privacy/security
changes
Big data and analytics
IoT will be driving the bulk of data for big data analytics, IoT and big
data will be symbiotic
#RSAC
Lessons from Healthcare
How healthcare can teach us lessons learned and best practices to
prepare for IoT in other industries
Why healthcare is a great
IoT model
Familiar to everyone
Long history of telemetry
Managing critical systems and
mission-critical Wi-Fi
Using sensors and monitors for
decades
Experienced in divergent and
convergent RF
#RSAC
Radio Frequency (RF) 101
Fundaments relevant to understanding wireless needs of IoT and
hyper-connected devices
#RSAC
RF Spectrum and History
#RSAC
RF Spectrum and History
Let’s look
at specific
RF
In years past, we’ve taken RF technologies and tried to CONVERGE them
to 802.11 standards, specifically around the 2.4 band.
Now, with the discrepancies in needs of IoT and enterprise WLANs, we
see the RF DIVERGING again.




RF changes are fundamentally the
MOST DISRUPTIVE
changes in Wi-Fi
to support IoT
• Hardware changes
• Power delivery changes
• Configuration changes
• Monitoring and security changes
#RSAC
Emergent Wireless Technologies
for IoT
What’s on the horizon to address the unique and divergent needs
of RF including 802.11ah (HaLow), 802.11af, and 802.11ad
#RSAC
3 Emergent Wi-Fi Technologies Related to IoT
802.11ah HaLow
for low data rate, long-range sensors and controllers
802.11af White-Fi
for similar applications to 802.11ah, uses unused TV
spectrums instead of 2.4 GHz or 5 GHz bands for
transmission
802.11ad WiGig
for multigigabit speeds and high-performance
networking (not new)
#RSAC
Conceptual View of 802.11 Standards
#RSAC
IoT’s Unique Requirements and Effect
on Quality – Security – Availability
Exploration of why today’s designs for Quality, Security, and
Availability don’t meet tomorrow’s needs for IoT devices
#RSAC
Wireless Quality and IoT Relates to:
Bandwidth
Speed
Capacity
Capability
#RSAC
Wireless Quality and IoT Determines:
Architecture/model such as cloud, cluster, or
controller
AP type, wireless standards supported, and
capability *
AP placement for density and capacity *
Backhaul capacity *
Applications running on wireless *
Planning of shared resources, channels *
Backwards compatibility settings
* = items where IoT needs differ greatly from
current WLAN endpoint needs
#RSAC
Wireless Security and IoT Relates to:
Accessed Resources
Access Medium
Users/Devices
#RSAC
Wireless Security and IoT Determines:
Provisioning process for endpoints *
Wireless authentication methods *
Cryptography selected *
SSID broadcast settings
Traffic paths and AP connections (tunneled,
bridged)
Network segmentation *
Compliance regulations *
Access for guests/unknown users
Tolerance of configuration changes to
endpoints (e.g. FDA, SCADA devices) *
Use of Wireless IPS (WIPS) *
* = items where IoT needs differ greatly from
current WLAN endpoint needs
#RSAC
Wireless Availability and IoT Relates to:
Uptime
Coverage
Capacity
#RSAC
Wireless Availability and IoT Determines:
Channel architecture, SCA vs MCA
Downtime tolerance *
Isolated maintenance requirements *
High availability planning *
Use of Wireless IPS (WIPS) for layer 1 *
Autonomy of APs and system *
Troubleshooting tools, logging, remediation,
SLAs *
Coverage planning *
Standards used, 802.11n, 11ac, Bluetooth *
Channel and power planning and DFS *
* = items where IoT needs differ greatly from
current WLAN endpoint needs
#RSAC
Expert Mobility: IoT Take-Aways
Recap of highlights, IoT disruption in wireless, and key points to
take to your organization for discussion
#RSAC
Your IoT Take-Aways
IoT isn’t just “more connected stuff”.
IoT devices have different fundamental needs from a network perspective.
Many IoT needs are in conflict with traditional wireless endpoint needs, so
prepare for divergent RF.
Regardless of industry,most organizations will be dealing with IoT soon, if not
already.
Successful IoT most likely requires a redesign of wireless, not just an up fit.
Get inter-department resources to collaborate on early planning and help
identify trends in your industry or organization.
#RSAC
Get Ready to Support IoT
Your next steps and eight areas for thinking and planning now
#RSAC
Get Ready to Support IoT
Research & prepare for divergent RF standards in the environment
Expect mass or bulk endpoint deployments
Expect smaller form factors than traditional endpoints
Start rethinking wireless security today
Create a strategy for managing (or at least monitoring) other RF
spectrums
Begin planning wireless networks for endpoints with very different
needs
Budget additional training for staff ***
SESSION ID:SESSION ID:
#RSAC
Jennifer Minella, CISSP
Expert Mobility: Managing the Wi-Fi
World of Wearables, Sensors and IoT
STR-R11
VP of Engineering
Carolina Advanced Digital, Inc.
www.cadinc.com and www.SecurityUncorked.com
@jjx on Twitter

More Related Content

What's hot

IoT across devices with Windows 10 and Azure IoT Suite by Admir Tuzović
IoT across devices with Windows 10 and Azure IoT Suite by Admir TuzovićIoT across devices with Windows 10 and Azure IoT Suite by Admir Tuzović
IoT across devices with Windows 10 and Azure IoT Suite by Admir Tuzović
Bosnia Agile
 

What's hot (20)

Getting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj ShahGetting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj Shah
 
IoT and Embedded OS Lecture - Cristian Toma and George Iosif
IoT and Embedded OS Lecture - Cristian Toma and George IosifIoT and Embedded OS Lecture - Cristian Toma and George Iosif
IoT and Embedded OS Lecture - Cristian Toma and George Iosif
 
M2M transitioning to IoT opportunity for telcos. Success references.
M2M transitioning to IoT opportunity for telcos. Success references.M2M transitioning to IoT opportunity for telcos. Success references.
M2M transitioning to IoT opportunity for telcos. Success references.
 
IoT Testing Services- Uncover All Critical Issues
IoT Testing Services- Uncover All Critical IssuesIoT Testing Services- Uncover All Critical Issues
IoT Testing Services- Uncover All Critical Issues
 
Watson IoT @Ryerson University - IEEE Chapter
Watson IoT  @Ryerson University - IEEE Chapter  Watson IoT  @Ryerson University - IEEE Chapter
Watson IoT @Ryerson University - IEEE Chapter
 
domain specific iot system
domain specific iot systemdomain specific iot system
domain specific iot system
 
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
 
IoT: Understanding its potential and what makes it tick! by Mark Torr
IoT: Understanding its potential and what makes it tick! by Mark TorrIoT: Understanding its potential and what makes it tick! by Mark Torr
IoT: Understanding its potential and what makes it tick! by Mark Torr
 
IoT across devices with Windows 10 and Azure IoT Suite by Admir Tuzović
IoT across devices with Windows 10 and Azure IoT Suite by Admir TuzovićIoT across devices with Windows 10 and Azure IoT Suite by Admir Tuzović
IoT across devices with Windows 10 and Azure IoT Suite by Admir Tuzović
 
Addressing Global Chanllenges Through IoT
Addressing Global Chanllenges Through IoTAddressing Global Chanllenges Through IoT
Addressing Global Chanllenges Through IoT
 
IoT Landscape and its Key Trends in Deployment
IoT Landscape and its Key Trends in DeploymentIoT Landscape and its Key Trends in Deployment
IoT Landscape and its Key Trends in Deployment
 
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
 
Iot how it works
Iot   how it worksIot   how it works
Iot how it works
 
IOT
IOTIOT
IOT
 
Watson IoT - IBM
Watson IoT - IBMWatson IoT - IBM
Watson IoT - IBM
 
Internet of Things (IoT
Internet of Things (IoTInternet of Things (IoT
Internet of Things (IoT
 
Keynote - IoT and role of Mediatek in the IoT space
Keynote - IoT and role of Mediatek in the IoT spaceKeynote - IoT and role of Mediatek in the IoT space
Keynote - IoT and role of Mediatek in the IoT space
 
Track 3 session 5 - st dev con 2016 - microsoft - from sensors to business ...
Track 3   session 5 - st dev con 2016 - microsoft - from sensors to business ...Track 3   session 5 - st dev con 2016 - microsoft - from sensors to business ...
Track 3 session 5 - st dev con 2016 - microsoft - from sensors to business ...
 
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptorsWhat Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
 
Davra IOT Solution -- Oil & Gas Remote Collaboration
Davra IOT Solution -- Oil & Gas Remote Collaboration Davra IOT Solution -- Oil & Gas Remote Collaboration
Davra IOT Solution -- Oil & Gas Remote Collaboration
 

Similar to Expert mobility managing wi-fi wearables sensors iot for availability quality security

Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
Amy Moore
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce tech
cheqala5626
 
Key Open Standards for inter-operable IoT systems
Key Open Standards for inter-operable IoT systemsKey Open Standards for inter-operable IoT systems
Key Open Standards for inter-operable IoT systems
Pratul Sharma
 

Similar to Expert mobility managing wi-fi wearables sensors iot for availability quality security (20)

Cisco dna for mobility introduction
Cisco dna for mobility introductionCisco dna for mobility introduction
Cisco dna for mobility introduction
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
 
Iot
IotIot
Iot
 
Io t a_de_techgigwebinar_04nov2016
Io t a_de_techgigwebinar_04nov2016Io t a_de_techgigwebinar_04nov2016
Io t a_de_techgigwebinar_04nov2016
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança
 
IOT technology-standards
IOT technology-standardsIOT technology-standards
IOT technology-standards
 
Global IoT Technology and Digital transformation
Global IoT Technology and Digital transformationGlobal IoT Technology and Digital transformation
Global IoT Technology and Digital transformation
 
IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce tech
 
Key Open Standards for inter-operable IoT systems
Key Open Standards for inter-operable IoT systemsKey Open Standards for inter-operable IoT systems
Key Open Standards for inter-operable IoT systems
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
 
Building Converged Plantwide Ethernet
Building Converged Plantwide EthernetBuilding Converged Plantwide Ethernet
Building Converged Plantwide Ethernet
 
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfA Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
 
The definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networksThe definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networks
 
the connection of iot with lora pan which enable
the connection of iot with lora pan which enablethe connection of iot with lora pan which enable
the connection of iot with lora pan which enable
 
The Network Impact of 802.11ac White Paper
The Network Impact of 802.11ac White PaperThe Network Impact of 802.11ac White Paper
The Network Impact of 802.11ac White Paper
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)
 
Web of things
Web of thingsWeb of things
Web of things
 
8 iot
8 iot8 iot
8 iot
 

More from Priyanka Aash

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Expert mobility managing wi-fi wearables sensors iot for availability quality security

  • 1. SESSION ID:SESSION ID: #RSAC Jennifer Minella, CISSP Expert Mobility: Managing the Wi-Fi World of Wearables, Sensors and IoT STR-R11 VP of Engineering Carolina Advanced Digital, Inc. www.cadinc.com and www.SecurityUncorked.com @jjx on Twitter
  • 2. #RSAC Expert Mobility: Managing the Wi-Fi World of Wearables, Sensors and IoT 2 Today’s connected enterprise relies on mobility for everything from guest services to tracking user behavior. As trends in IoT grow, the requirements of your network morph to a mobile-first environment where availability, security and quality are key to delivering reliable services with appropriate security from today’s threats. IoT devices and networks have unique needs, often in contradiction to traditional WLAN endpoints. The needs are discussed and contrasted in terms of wireless Quality, Security, and Availability.
  • 3. #RSAC Quality – Security – Availability Trends in Traditional WLANs A two-minute overview to set the stage
  • 4. Traditional Wi-Fi needs for quality, security, and availability are tailored to the current endpoints and applications. • Quality: Bandwidth, Speed, Capacity, Capability • Security: Accessed resources, Access medium, Users/Devices • Availability: Uptime, Coverage, Capacity
  • 5. #RSAC Defining IoT The past, the present, the future, and why IoT will affect every enterprise in the next three years
  • 6. IoT has a past, present, and future and it’s more than just “lots of connected things.”
  • 7. Things Wi-Fi connected that traditionally were not. Things Wi-Fi connected that maybe shouldn’t be. Our “hold my beer and watch this” era. Complex wireless ecosystem with billions of connected devices, and machine-to-machine data sharing and analytics.
  • 8. Industries and applications for IoT Other industries using IoT: Manufacturing Transportation Defense Agriculture & Food Service Infrastructure Retail Logistics Banks Utilities and power Smart Buildings Hospitality Healthcare 41% CAGR- total IoT devices installed
  • 9. #RSAC Recursion: Trends and Cycles in Computing A brief look at the cyclic nature of technology trends and their impact on IoT
  • 10. We’ve Been Here Before… Heavy -> light -> heavy (applications, wireless, endpoints) Centralized -> distributed -> centralized (computing, clients, intelligence) Divergent -> converged -> divergent (RF, medium) 50-year progression to inter- connectedness
  • 11. #RSAC Other Current Tech Trends Affecting IoT Consumerization proliferation of connected devices for home, personal use, quantified self- reflected in commercial applications, monitors, sensors Smart-things not only Internet connected but usually machine-to-machine with peers and central analytics, drives data, cloud, privacy/security changes Big data and analytics IoT will be driving the bulk of data for big data analytics, IoT and big data will be symbiotic
  • 12. #RSAC Lessons from Healthcare How healthcare can teach us lessons learned and best practices to prepare for IoT in other industries
  • 13. Why healthcare is a great IoT model Familiar to everyone Long history of telemetry Managing critical systems and mission-critical Wi-Fi Using sensors and monitors for decades Experienced in divergent and convergent RF
  • 14. #RSAC Radio Frequency (RF) 101 Fundaments relevant to understanding wireless needs of IoT and hyper-connected devices
  • 16. #RSAC RF Spectrum and History Let’s look at specific RF
  • 17. In years past, we’ve taken RF technologies and tried to CONVERGE them to 802.11 standards, specifically around the 2.4 band. Now, with the discrepancies in needs of IoT and enterprise WLANs, we see the RF DIVERGING again.    
  • 18.
  • 19.
  • 20. RF changes are fundamentally the MOST DISRUPTIVE changes in Wi-Fi to support IoT • Hardware changes • Power delivery changes • Configuration changes • Monitoring and security changes
  • 21. #RSAC Emergent Wireless Technologies for IoT What’s on the horizon to address the unique and divergent needs of RF including 802.11ah (HaLow), 802.11af, and 802.11ad
  • 22. #RSAC 3 Emergent Wi-Fi Technologies Related to IoT 802.11ah HaLow for low data rate, long-range sensors and controllers 802.11af White-Fi for similar applications to 802.11ah, uses unused TV spectrums instead of 2.4 GHz or 5 GHz bands for transmission 802.11ad WiGig for multigigabit speeds and high-performance networking (not new)
  • 23. #RSAC Conceptual View of 802.11 Standards
  • 24.
  • 25.
  • 26. #RSAC IoT’s Unique Requirements and Effect on Quality – Security – Availability Exploration of why today’s designs for Quality, Security, and Availability don’t meet tomorrow’s needs for IoT devices
  • 27. #RSAC Wireless Quality and IoT Relates to: Bandwidth Speed Capacity Capability
  • 28. #RSAC Wireless Quality and IoT Determines: Architecture/model such as cloud, cluster, or controller AP type, wireless standards supported, and capability * AP placement for density and capacity * Backhaul capacity * Applications running on wireless * Planning of shared resources, channels * Backwards compatibility settings * = items where IoT needs differ greatly from current WLAN endpoint needs
  • 29. #RSAC Wireless Security and IoT Relates to: Accessed Resources Access Medium Users/Devices
  • 30. #RSAC Wireless Security and IoT Determines: Provisioning process for endpoints * Wireless authentication methods * Cryptography selected * SSID broadcast settings Traffic paths and AP connections (tunneled, bridged) Network segmentation * Compliance regulations * Access for guests/unknown users Tolerance of configuration changes to endpoints (e.g. FDA, SCADA devices) * Use of Wireless IPS (WIPS) * * = items where IoT needs differ greatly from current WLAN endpoint needs
  • 31. #RSAC Wireless Availability and IoT Relates to: Uptime Coverage Capacity
  • 32. #RSAC Wireless Availability and IoT Determines: Channel architecture, SCA vs MCA Downtime tolerance * Isolated maintenance requirements * High availability planning * Use of Wireless IPS (WIPS) for layer 1 * Autonomy of APs and system * Troubleshooting tools, logging, remediation, SLAs * Coverage planning * Standards used, 802.11n, 11ac, Bluetooth * Channel and power planning and DFS * * = items where IoT needs differ greatly from current WLAN endpoint needs
  • 33. #RSAC Expert Mobility: IoT Take-Aways Recap of highlights, IoT disruption in wireless, and key points to take to your organization for discussion
  • 34. #RSAC Your IoT Take-Aways IoT isn’t just “more connected stuff”. IoT devices have different fundamental needs from a network perspective. Many IoT needs are in conflict with traditional wireless endpoint needs, so prepare for divergent RF. Regardless of industry,most organizations will be dealing with IoT soon, if not already. Successful IoT most likely requires a redesign of wireless, not just an up fit. Get inter-department resources to collaborate on early planning and help identify trends in your industry or organization.
  • 35. #RSAC Get Ready to Support IoT Your next steps and eight areas for thinking and planning now
  • 36. #RSAC Get Ready to Support IoT Research & prepare for divergent RF standards in the environment Expect mass or bulk endpoint deployments Expect smaller form factors than traditional endpoints Start rethinking wireless security today Create a strategy for managing (or at least monitoring) other RF spectrums Begin planning wireless networks for endpoints with very different needs Budget additional training for staff ***
  • 37. SESSION ID:SESSION ID: #RSAC Jennifer Minella, CISSP Expert Mobility: Managing the Wi-Fi World of Wearables, Sensors and IoT STR-R11 VP of Engineering Carolina Advanced Digital, Inc. www.cadinc.com and www.SecurityUncorked.com @jjx on Twitter