SlideShare une entreprise Scribd logo
1  sur  18
Inspiring Our Digital FutureCONFIDENTIAL AND PROPRIETARY

This presentation, including any supporting materials, is owned by neXt Curve and/or its affiliates and is for the sole use of the intended
neXt Curve audience or other intended recipients.  This presentation may contain information that is confidential, proprietary or otherwise
legally protected, and it may not be further copied, distributed or publicly displayed without the express written permission of neXt Curve or
its affiliates.

 

© 2018 neXt Curve and/or its affiliates. All rights reserved.
reThink Webinar
What Do Meltdown & Spectre Mean for IoT Past,
Present & Future?
February 6, 2018
Version 1.0
© 2018 neXt Curve and/or its affiliates. All rights reserved.
Introducing neXt Curve
Leonard Lee
Managing Director &
Founder of neXt Curve
neXt Curve is a San Diego-based
boutique consulting and venture
capital firm focused on advising
entrepreneurs, enterprises and
governments in the building of a
better digital future for all.
“We believe that a better
future requires the proactive
incubation and funding of
transformative ideas and the
businesses that will make
those ideas happen.”
An executive consultant with
23-years of experience with
leading tech and strategy firms.
© 2018 neXt Curve and/or its affiliates. All rights reserved.
neXt Curve Principal Panel
© 2018 neXt Curve and/or its affiliates. All rights reserved.
Meltdown & Spectre: The Threat We Don’t Want To Talk About
Beyond Apple: The Internet Of Security Risk
Tackling The Great Digital Risk Of Our Time
1
2
3
Discussion Agenda
© 2018 neXt Curve and/or its affiliates. All rights reserved.
Meltdown & Spectre: The Threat
We Don’t Want To Talk About1
Agenda Topic 1
© 2018 neXt Curve and/or its affiliates. All rights reserved.
Both Spectre & Meltdown exploit a device-level CPU side
channel vulnerability in processors
Meltdown takes advantage of out of order execution
capabilities of certain CPUs
Spectre takes advantage of branch prediction capabilities
of certain CPUs
Meltdown & Spectre impact a wide range of devices with
affected processors produced since 1995
Not all devices are affected. There are processors such as
StrongARM, Raspberry Pi that are deemed to be immune
What Do We Know?
Network
Device
Data & Content
Business Applications
You or Your Customer
Processor
Threat
© 2018 neXt Curve and/or its affiliates. All rights reserved.
AV-TEST identified over 139
malware samples between
January 7 and January 31
which sought to exploit the
Meltdown & Spectre security
vulnerabilities.
We can only expect growing
number of attempts to exploit
Meltdown & Spectre, which
will keep consumers and
enterprises vigilant for the
foreseeable future.
Now We Know, And So Do Bad Actors!
Source: AV-TEST
© 2018 neXt Curve and/or its affiliates. All rights reserved.
Agenda Topic 2
Beyond Apple: The Internet of
Security Risk2
© 2018 neXt Curve and/or its affiliates. All rights reserved.
The Problem Is Bigger Than Your iPhone
Consumer Devices Business Devices
Industrial Devices
The Internet
of Things
© 2018 neXt Curve and/or its affiliates. All rights reserved.
The IoT Security Threat Landscape
Industrial Enterprise
Consumer
Digital,
Connected Devices
Digital Service
Providers
Data Center/
Edge Computing
Your Internet
of Things
© 2018 neXt Curve and/or its affiliates. All rights reserved.
Agenda Topic 3
Tackling The Great Security
Risk Of Our Time3
© 2018 neXt Curve and/or its affiliates. All rights reserved.
How Do You Get Started And What Will The
Journey To Remediation Look Like?
REMEDIATEPLANPRIORITIZEASSESSProcess
Tools
Risk Assessment
Framework
Remediation & Invest
Decision Model
Remediation
Strategy & Plan
Remediation
Implementation
Governance &
Program Model
Govern &
Manage
Vendors Service
Providers
Corporate
Tech
Business
Stakeholders
© 2018 neXt Curve and/or its affiliates. All rights reserved.
Recommendations for Business Leaders
Take a holistic, multi-layered approach to security risk assessment
Quickly qualify and communicate the Meltdown/Spectre-related risk
Establish a decision framework to prioritize remediation investments
Establish PMO to manage vendors and service providers
1
2
3
4
Continue to assess the threats coming into your IoT portfolio5
© 2018 neXt Curve and/or its affiliates. All rights reserved.
Where can I find more information?
Go to our website at www.next-curve.com
Download our reThink research note
Set up an inquiry call with neXt Curve
© 2018 neXt Curve and/or its affiliates. All rights reserved.
How can neXt Curve help?
neXt Curve offers services that can help your
team and organization conceptualize and
design new products and business models
against critical trends in digital technology that
will shape the market and competitive
landscapes of your industry.
neXt Curve works with you through four basic
formats that can get our extensive network of
executive-level consultants and renowned
industry analysts engaged with you in
addressing your most critical challenges.
© 2018 neXt Curve and/or its affiliates. All rights reserved.
neXt Curve Risk Assessment & Remediation
Strategy Workshop
neXt Curve designs and moderates a 2 to 3 Day Executive Workshop program to help you and your
team develop a strategy and plan to address the Meltdown & Spectre threat to your business.
Key Outcomes
High-Level Security Posture
Assessment

Environment Risk Profile

Prioritization Criteria &
Decision Model Framework

Remediation Strategy

Remediation Action Plan

Draft Governance & Program
Framework
© 2018 neXt Curve and/or its affiliates. All rights reserved.
Contacts
Leonard Lee
Managing Director

neXt Curve

leonard.lee@next-curve.com

(619) 405-8329

www.next-curve.com
Thank You!

Contenu connexe

Tendances

Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynoteNur Shiqim Chok
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationNetworkCollaborators
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteSplunk
 
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4Nur Shiqim Chok
 
eGestalt Partners Find Profitable Bundling Opportunities with New Cloud Secur...
eGestalt Partners Find Profitable Bundling Opportunities with New Cloud Secur...eGestalt Partners Find Profitable Bundling Opportunities with New Cloud Secur...
eGestalt Partners Find Profitable Bundling Opportunities with New Cloud Secur...flashnewsrelease
 
eGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyeGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with Aegifyflashnewsrelease
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...NetworkCollaborators
 
Confessions of a CIO
Confessions of a CIOConfessions of a CIO
Confessions of a CIODelphix
 
Webinar: Adaptive Security
Webinar: Adaptive SecurityWebinar: Adaptive Security
Webinar: Adaptive SecurityBlueliv
 
[Cisco Connect 2018 - Vietnam] Jijun cai present - cisco connect 2018 vn- c...
[Cisco Connect 2018 - Vietnam] Jijun cai   present - cisco connect 2018 vn- c...[Cisco Connect 2018 - Vietnam] Jijun cai   present - cisco connect 2018 vn- c...
[Cisco Connect 2018 - Vietnam] Jijun cai present - cisco connect 2018 vn- c...Nur Shiqim Chok
 
Webinar: The role of Threat Intelligence Feeds in the battle against evolving...
Webinar: The role of Threat Intelligence Feeds in the battle against evolving...Webinar: The role of Threat Intelligence Feeds in the battle against evolving...
Webinar: The role of Threat Intelligence Feeds in the battle against evolving...Blueliv
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomyCisco Russia
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy NetworkCollaborators
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientAccenture Operations
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureNetworkCollaborators
 
Mike Gillespie - The Internet of Everything
Mike Gillespie - The Internet of Everything Mike Gillespie - The Internet of Everything
Mike Gillespie - The Internet of Everything IISPEastMids
 
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Accenture Operations
 
Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10Prabir Saha
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXNetworkCollaborators
 
Transformationplus Corporate Profile
Transformationplus Corporate ProfileTransformationplus Corporate Profile
Transformationplus Corporate ProfilePrabir Saha
 

Tendances (20)

Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynote
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
 
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
 
eGestalt Partners Find Profitable Bundling Opportunities with New Cloud Secur...
eGestalt Partners Find Profitable Bundling Opportunities with New Cloud Secur...eGestalt Partners Find Profitable Bundling Opportunities with New Cloud Secur...
eGestalt Partners Find Profitable Bundling Opportunities with New Cloud Secur...
 
eGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyeGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with Aegify
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
 
Confessions of a CIO
Confessions of a CIOConfessions of a CIO
Confessions of a CIO
 
Webinar: Adaptive Security
Webinar: Adaptive SecurityWebinar: Adaptive Security
Webinar: Adaptive Security
 
[Cisco Connect 2018 - Vietnam] Jijun cai present - cisco connect 2018 vn- c...
[Cisco Connect 2018 - Vietnam] Jijun cai   present - cisco connect 2018 vn- c...[Cisco Connect 2018 - Vietnam] Jijun cai   present - cisco connect 2018 vn- c...
[Cisco Connect 2018 - Vietnam] Jijun cai present - cisco connect 2018 vn- c...
 
Webinar: The role of Threat Intelligence Feeds in the battle against evolving...
Webinar: The role of Threat Intelligence Feeds in the battle against evolving...Webinar: The role of Threat Intelligence Feeds in the battle against evolving...
Webinar: The role of Threat Intelligence Feeds in the battle against evolving...
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital Economy
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
 
Mike Gillespie - The Internet of Everything
Mike Gillespie - The Internet of Everything Mike Gillespie - The Internet of Everything
Mike Gillespie - The Internet of Everything
 
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure
 
Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
 
Transformationplus Corporate Profile
Transformationplus Corporate ProfileTransformationplus Corporate Profile
Transformationplus Corporate Profile
 

Similaire à neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?

neXt Curve reThink: The Future of Retail: Retail 2.0
neXt Curve reThink: The Future of Retail: Retail 2.0neXt Curve reThink: The Future of Retail: Retail 2.0
neXt Curve reThink: The Future of Retail: Retail 2.0Leonard Lee
 
neXt Curve Mobile World Congress 2018 Key Takeaways
neXt Curve Mobile World Congress 2018 Key TakeawaysneXt Curve Mobile World Congress 2018 Key Takeaways
neXt Curve Mobile World Congress 2018 Key TakeawaysLeonard Lee
 
neXt Curve Cloud Spectator-The Hybrid Cloud Bill of Rights
neXt Curve Cloud Spectator-The Hybrid Cloud Bill of RightsneXt Curve Cloud Spectator-The Hybrid Cloud Bill of Rights
neXt Curve Cloud Spectator-The Hybrid Cloud Bill of RightsLeonard Lee
 
neXt Curve IBM Digital Reinvention 2018
neXt Curve IBM Digital Reinvention 2018neXt Curve IBM Digital Reinvention 2018
neXt Curve IBM Digital Reinvention 2018Leonard Lee
 
Advanced blockchain
Advanced blockchain Advanced blockchain
Advanced blockchain TechMeetups
 
neXt Curve IBM: The Future of Cloud and The Cloud Continuum
neXt Curve IBM: The Future of Cloud and The Cloud ContinuumneXt Curve IBM: The Future of Cloud and The Cloud Continuum
neXt Curve IBM: The Future of Cloud and The Cloud ContinuumLeonard Lee
 
The Sky Is The Limit (CCC)
The Sky Is The Limit (CCC)The Sky Is The Limit (CCC)
The Sky Is The Limit (CCC)ITpreneurs
 
Detecon Cyber Security Radar
Detecon Cyber Security RadarDetecon Cyber Security Radar
Detecon Cyber Security RadarDaniel Steinfeld
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
SDN Adoption Challenges
SDN Adoption Challenges SDN Adoption Challenges
SDN Adoption Challenges Vimal Suba
 
neXt Curve ITExpo 2018 Event Review
neXt Curve ITExpo 2018 Event ReviewneXt Curve ITExpo 2018 Event Review
neXt Curve ITExpo 2018 Event ReviewLeonard Lee
 
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...Symantec
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Successaccenture
 
Ciso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itCiso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itChandra Sekhar Tondepu
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network Mighty Guides, Inc.
 
neXt Curve IoT Evolution Expo 2018 Event Review
neXt Curve IoT Evolution Expo 2018 Event ReviewneXt Curve IoT Evolution Expo 2018 Event Review
neXt Curve IoT Evolution Expo 2018 Event ReviewLeonard Lee
 
Cybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensCybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensaakash malhotra
 
neXt Curve reThink: Blockchain & Cryptocurrencies
neXt Curve reThink: Blockchain & CryptocurrenciesneXt Curve reThink: Blockchain & Cryptocurrencies
neXt Curve reThink: Blockchain & CryptocurrenciesLeonard Lee
 
Next gen networking solution providers-compressed
Next gen networking solution providers-compressedNext gen networking solution providers-compressed
Next gen networking solution providers-compressedMirror Review
 

Similaire à neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future? (20)

neXt Curve reThink: The Future of Retail: Retail 2.0
neXt Curve reThink: The Future of Retail: Retail 2.0neXt Curve reThink: The Future of Retail: Retail 2.0
neXt Curve reThink: The Future of Retail: Retail 2.0
 
neXt Curve Mobile World Congress 2018 Key Takeaways
neXt Curve Mobile World Congress 2018 Key TakeawaysneXt Curve Mobile World Congress 2018 Key Takeaways
neXt Curve Mobile World Congress 2018 Key Takeaways
 
neXt Curve Cloud Spectator-The Hybrid Cloud Bill of Rights
neXt Curve Cloud Spectator-The Hybrid Cloud Bill of RightsneXt Curve Cloud Spectator-The Hybrid Cloud Bill of Rights
neXt Curve Cloud Spectator-The Hybrid Cloud Bill of Rights
 
neXt Curve IBM Digital Reinvention 2018
neXt Curve IBM Digital Reinvention 2018neXt Curve IBM Digital Reinvention 2018
neXt Curve IBM Digital Reinvention 2018
 
Advanced blockchain
Advanced blockchain Advanced blockchain
Advanced blockchain
 
neXt Curve IBM: The Future of Cloud and The Cloud Continuum
neXt Curve IBM: The Future of Cloud and The Cloud ContinuumneXt Curve IBM: The Future of Cloud and The Cloud Continuum
neXt Curve IBM: The Future of Cloud and The Cloud Continuum
 
The Sky Is The Limit (CCC)
The Sky Is The Limit (CCC)The Sky Is The Limit (CCC)
The Sky Is The Limit (CCC)
 
Detecon Cyber Security Radar
Detecon Cyber Security RadarDetecon Cyber Security Radar
Detecon Cyber Security Radar
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
SDN Adoption Challenges
SDN Adoption Challenges SDN Adoption Challenges
SDN Adoption Challenges
 
neXt Curve ITExpo 2018 Event Review
neXt Curve ITExpo 2018 Event ReviewneXt Curve ITExpo 2018 Event Review
neXt Curve ITExpo 2018 Event Review
 
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
Ciso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itCiso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal it
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
neXt Curve IoT Evolution Expo 2018 Event Review
neXt Curve IoT Evolution Expo 2018 Event ReviewneXt Curve IoT Evolution Expo 2018 Event Review
neXt Curve IoT Evolution Expo 2018 Event Review
 
Cybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensCybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lens
 
neXt Curve reThink: Blockchain & Cryptocurrencies
neXt Curve reThink: Blockchain & CryptocurrenciesneXt Curve reThink: Blockchain & Cryptocurrencies
neXt Curve reThink: Blockchain & Cryptocurrencies
 
Company_Profile_Updated_17032016
Company_Profile_Updated_17032016Company_Profile_Updated_17032016
Company_Profile_Updated_17032016
 
Next gen networking solution providers-compressed
Next gen networking solution providers-compressedNext gen networking solution providers-compressed
Next gen networking solution providers-compressed
 

Plus de Leonard Lee

neXt Curve The Great Gap: Digital Leadership & Governance
neXt Curve The Great Gap: Digital Leadership & GovernanceneXt Curve The Great Gap: Digital Leadership & Governance
neXt Curve The Great Gap: Digital Leadership & GovernanceLeonard Lee
 
Tokenization: Fueling The Blockchain Business Model
Tokenization: Fueling The Blockchain Business ModelTokenization: Fueling The Blockchain Business Model
Tokenization: Fueling The Blockchain Business ModelLeonard Lee
 
neXt Curve: The Way of The Intercepting Business
neXt Curve: The Way of The Intercepting BusinessneXt Curve: The Way of The Intercepting Business
neXt Curve: The Way of The Intercepting BusinessLeonard Lee
 
neXt Curve reThink: The Future of The Car
neXt Curve reThink: The Future of The CarneXt Curve reThink: The Future of The Car
neXt Curve reThink: The Future of The CarLeonard Lee
 
neXt Curve-CES 2018 Event Review
neXt Curve-CES 2018 Event ReviewneXt Curve-CES 2018 Event Review
neXt Curve-CES 2018 Event ReviewLeonard Lee
 
Predictive Asset Optimization - Advanced Analytics
Predictive Asset Optimization - Advanced AnalyticsPredictive Asset Optimization - Advanced Analytics
Predictive Asset Optimization - Advanced AnalyticsLeonard Lee
 
Software-Defined Supply Chain: The Next Industrial Revolution
Software-Defined Supply Chain: The Next Industrial RevolutionSoftware-Defined Supply Chain: The Next Industrial Revolution
Software-Defined Supply Chain: The Next Industrial RevolutionLeonard Lee
 

Plus de Leonard Lee (7)

neXt Curve The Great Gap: Digital Leadership & Governance
neXt Curve The Great Gap: Digital Leadership & GovernanceneXt Curve The Great Gap: Digital Leadership & Governance
neXt Curve The Great Gap: Digital Leadership & Governance
 
Tokenization: Fueling The Blockchain Business Model
Tokenization: Fueling The Blockchain Business ModelTokenization: Fueling The Blockchain Business Model
Tokenization: Fueling The Blockchain Business Model
 
neXt Curve: The Way of The Intercepting Business
neXt Curve: The Way of The Intercepting BusinessneXt Curve: The Way of The Intercepting Business
neXt Curve: The Way of The Intercepting Business
 
neXt Curve reThink: The Future of The Car
neXt Curve reThink: The Future of The CarneXt Curve reThink: The Future of The Car
neXt Curve reThink: The Future of The Car
 
neXt Curve-CES 2018 Event Review
neXt Curve-CES 2018 Event ReviewneXt Curve-CES 2018 Event Review
neXt Curve-CES 2018 Event Review
 
Predictive Asset Optimization - Advanced Analytics
Predictive Asset Optimization - Advanced AnalyticsPredictive Asset Optimization - Advanced Analytics
Predictive Asset Optimization - Advanced Analytics
 
Software-Defined Supply Chain: The Next Industrial Revolution
Software-Defined Supply Chain: The Next Industrial RevolutionSoftware-Defined Supply Chain: The Next Industrial Revolution
Software-Defined Supply Chain: The Next Industrial Revolution
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Dernier (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?

  • 1. Inspiring Our Digital FutureCONFIDENTIAL AND PROPRIETARY
 This presentation, including any supporting materials, is owned by neXt Curve and/or its affiliates and is for the sole use of the intended neXt Curve audience or other intended recipients.  This presentation may contain information that is confidential, proprietary or otherwise legally protected, and it may not be further copied, distributed or publicly displayed without the express written permission of neXt Curve or its affiliates.  
 © 2018 neXt Curve and/or its affiliates. All rights reserved. reThink Webinar What Do Meltdown & Spectre Mean for IoT Past, Present & Future? February 6, 2018 Version 1.0
  • 2. © 2018 neXt Curve and/or its affiliates. All rights reserved. Introducing neXt Curve Leonard Lee Managing Director & Founder of neXt Curve neXt Curve is a San Diego-based boutique consulting and venture capital firm focused on advising entrepreneurs, enterprises and governments in the building of a better digital future for all. “We believe that a better future requires the proactive incubation and funding of transformative ideas and the businesses that will make those ideas happen.” An executive consultant with 23-years of experience with leading tech and strategy firms.
  • 3. © 2018 neXt Curve and/or its affiliates. All rights reserved. neXt Curve Principal Panel
  • 4. © 2018 neXt Curve and/or its affiliates. All rights reserved. Meltdown & Spectre: The Threat We Don’t Want To Talk About Beyond Apple: The Internet Of Security Risk Tackling The Great Digital Risk Of Our Time 1 2 3 Discussion Agenda
  • 5. © 2018 neXt Curve and/or its affiliates. All rights reserved. Meltdown & Spectre: The Threat We Don’t Want To Talk About1 Agenda Topic 1
  • 6. © 2018 neXt Curve and/or its affiliates. All rights reserved. Both Spectre & Meltdown exploit a device-level CPU side channel vulnerability in processors Meltdown takes advantage of out of order execution capabilities of certain CPUs Spectre takes advantage of branch prediction capabilities of certain CPUs Meltdown & Spectre impact a wide range of devices with affected processors produced since 1995 Not all devices are affected. There are processors such as StrongARM, Raspberry Pi that are deemed to be immune What Do We Know? Network Device Data & Content Business Applications You or Your Customer Processor Threat
  • 7. © 2018 neXt Curve and/or its affiliates. All rights reserved. AV-TEST identified over 139 malware samples between January 7 and January 31 which sought to exploit the Meltdown & Spectre security vulnerabilities. We can only expect growing number of attempts to exploit Meltdown & Spectre, which will keep consumers and enterprises vigilant for the foreseeable future. Now We Know, And So Do Bad Actors! Source: AV-TEST
  • 8. © 2018 neXt Curve and/or its affiliates. All rights reserved. Agenda Topic 2 Beyond Apple: The Internet of Security Risk2
  • 9. © 2018 neXt Curve and/or its affiliates. All rights reserved. The Problem Is Bigger Than Your iPhone Consumer Devices Business Devices Industrial Devices The Internet of Things
  • 10. © 2018 neXt Curve and/or its affiliates. All rights reserved. The IoT Security Threat Landscape Industrial Enterprise Consumer Digital, Connected Devices Digital Service Providers Data Center/ Edge Computing Your Internet of Things
  • 11. © 2018 neXt Curve and/or its affiliates. All rights reserved. Agenda Topic 3 Tackling The Great Security Risk Of Our Time3
  • 12. © 2018 neXt Curve and/or its affiliates. All rights reserved. How Do You Get Started And What Will The Journey To Remediation Look Like? REMEDIATEPLANPRIORITIZEASSESSProcess Tools Risk Assessment Framework Remediation & Invest Decision Model Remediation Strategy & Plan Remediation Implementation Governance & Program Model Govern & Manage Vendors Service Providers Corporate Tech Business Stakeholders
  • 13. © 2018 neXt Curve and/or its affiliates. All rights reserved. Recommendations for Business Leaders Take a holistic, multi-layered approach to security risk assessment Quickly qualify and communicate the Meltdown/Spectre-related risk Establish a decision framework to prioritize remediation investments Establish PMO to manage vendors and service providers 1 2 3 4 Continue to assess the threats coming into your IoT portfolio5
  • 14. © 2018 neXt Curve and/or its affiliates. All rights reserved. Where can I find more information? Go to our website at www.next-curve.com Download our reThink research note Set up an inquiry call with neXt Curve
  • 15. © 2018 neXt Curve and/or its affiliates. All rights reserved. How can neXt Curve help? neXt Curve offers services that can help your team and organization conceptualize and design new products and business models against critical trends in digital technology that will shape the market and competitive landscapes of your industry. neXt Curve works with you through four basic formats that can get our extensive network of executive-level consultants and renowned industry analysts engaged with you in addressing your most critical challenges.
  • 16. © 2018 neXt Curve and/or its affiliates. All rights reserved. neXt Curve Risk Assessment & Remediation Strategy Workshop neXt Curve designs and moderates a 2 to 3 Day Executive Workshop program to help you and your team develop a strategy and plan to address the Meltdown & Spectre threat to your business. Key Outcomes High-Level Security Posture Assessment Environment Risk Profile Prioritization Criteria & Decision Model Framework Remediation Strategy Remediation Action Plan Draft Governance & Program Framework
  • 17. © 2018 neXt Curve and/or its affiliates. All rights reserved. Contacts Leonard Lee Managing Director neXt Curve leonard.lee@next-curve.com (619) 405-8329 www.next-curve.com