SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
Internet of Things
It-sikkerhed 2014
Copenhagen
5-6. February 2014
Agenda
1.  Introduction
2.  Protecting the PC
3.  Cloud security
4.  Internet of things
5.  New security risks 
6.  Openness and transparency
7.  Legal responses
8.  Conclusions
9.  Debate
Page 2
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
1. Introduction
●  Martin von Haller Grønbæk
•  Partner, Bird & Bird
•  Bird & Bird – only international law
firm in Denmark
•  Leading law firm on Cyber- and
network security
•  Former member of Danish IT
Security Council
•  "Open source advocate"
Page 3
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
2. PC as the node in the network
●  PC revolution brought “power to the people”
●  And to businesses and government – small
and large
●  Rise of the general purpose computer
●  Open for attack
●  Defence of the home front
●  Internet and the network effects
●  PC as the attacked and tool for the attacker

Page 4
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
2. The birth of the IT Security
industry
● 
● 
● 
● 
● 
● 
● 
● 
● 

Critical mass market
Large number of new customers
Large losses looming
Loss of data and downtime
Inconvenience and lost productivity
(and big corporate monetary losses)
Malware
Spam
Date theft

Page 5
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
2. “Thou Shall Protect Thyself”
●  Self-protection
●  Liability rests with the PC-user
●  Hardware and software comes with no
warranties
●  No legal protection
●  Little market for “safe IT” among consumers
●  Large market for add-on IT security software
●  Large numbers of small payments makes big
profits
●  Many small and large providers
Page 6
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
3. New market conditions
● 
● 
● 
● 
● 
● 
● 
● 

Cloud computing!
No more local applications
Computing takes places in the cloud
Less asymmetric information
Much fewer customers
Dramatic shift in bargaining power
And technical challenges!
Goodbye, many small and large IT-security
firms

Page 7
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
3. Is the cloud more “secure”?
● 
● 
● 
● 
● 
● 
● 

Fewer amateurs and more professionals
Very specialized cloud service providers
Cloud as “the fog”
An “oligopoly” of Clouds
User has even less bargaining power
Very little control of data
Very little contractual and legal protection

Page 8
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
4. Internet of Things
● 
● 
● 
● 
● 
● 
● 

Not everything is moving into the Cloud
Moore Law
Mobile devices
Quantified self
Health, Energy, Automotive etc.
Nano
Gartner: $1.9 trillion to the global economy
by 2020
●  Nest acquired for $3.2 billion in cash

Page 9
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
4. The “true” Internet
● 
● 
● 
● 
● 
● 
● 

The Internet today is asymmetric
More download, less upload
New medium for broadcasting
The Internet is decentralized by nature
Read/Write
Social media: Blogs before Facebook
Mesh or Grid computing

Page 10
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
4. Towards the “real” Internet?
● 
● 
● 
● 
● 
● 
● 
● 
● 

Free software vs. cloud computing
(Cloud is based on open source software)
Plug servers
Every device = a server = a node = equal
Cloud computing backlash
New computing models
Peer2Peer data and processor sharing
Mesh or Grid computing
Innovation!

Page 11
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
5. Before Cloud computing
revisited
● 
● 
● 
● 
● 
● 
● 
● 
● 

Computing moves from cloud to devices
Devicesn
Processing Powern
Internet enabled
Always on
AI or Autonomous
Remotely accessed and controlled
Who’s the user?
Self-protection?

Page 12
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
5. Same but bigger security risks
● 
● 
● 
● 
● 
● 
● 
● 
● 

Bigger threats than PC
Obvious network effects
Inconvenience and lost productivity?
Critical functions: Health, Auto etc.
No checks on AI and automatic functions
Life and death
Systemic risks
DDoS attacks
“To Big to Fail”

Page 13
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
5. Unsecure today!
● 
● 
● 
● 
● 
● 
● 
● 
● 

Starting point: Very unsecure
Devices are shamelessly unpatched
No standards
Little press attention
Before tipping point
But it’ll come!
Industry initiatives
AllSeen, OpenDaylight
Open Auto Alliance, Genivi

Page 14
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
6. Open and transparent
● 
● 
● 
● 
● 
● 
● 
● 
● 

Most devices run on open source software
“Closed” is not an option
One platform: Linux
Less diversity
Economies of scale for malware
Open access promotes discovery
Open use lower barriers of entry for fixes
Huge user advantages from open platforms
Closed options where appropriate

Page 15
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
7. Legislation
● 
● 
● 
● 
● 
● 
● 
● 
● 

Starting point: No legislation
Industry standards
Contractual demands
Open source security services
Industry and device specific legislation
Heath care
Transportation
Privacy
Service provider, not “technology”

Page 16
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
7. Liability
● 
● 
● 
● 
● 
● 
● 
● 
● 
● 

Who assume the risk of loss?
Who is the better at prevention?
Consumer?
Reversed burden of proof
Strict liability
Who should liable? Vendor, producer, provider?
Don’t kill innovation!
More disclosure of insecurity and breach
Standards of “Good IoT IT security practices”
Strict liability of certain types of devises

Page 17
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
7. Conclusions
●  The IT security industry as we know it will change
dramatically
●  Cloud computed will see a backlash
●  Internet of Things will increase number of Internet
connected computers
●  Old type security threats will re-emerge with a
vengeance
●  Solutions will be based on open source software
●  Maybe new legislation on disclosure and strict liability
for certain devices
●  Invest your money in new IT security start-ups with
IoT solutions!
Page 18
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
8. Questions
●  And maybe some answers…

Page 19
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
Thank You
Martin von Haller Grønbæk
Mobile: +45 40 73 19 14
Email: Martin.vonhaller@twobirds.com
Bird & Bird is an international legal practice comprising Bird & Bird LLP and its affiliated and associated businesses.
Bird & Bird LLP is a limited liability partnership, registered in England and Wales with registered number OC340318 and is authorised and regulated by the
Solicitors Regulation Authority. Its registered office and principal place of business is at 15 Fetter Lane, London EC4A 1JP. A list of members of Bird & Bird LLP and
of any non-members who are designated as partners, and of their respective professional qualifications, is open to inspection at that address.
twobirds.com

Contenu connexe

Tendances

A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
bmcmenemy
 

Tendances (20)

Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot
 
Scaling IoT Security
Scaling IoT SecurityScaling IoT Security
Scaling IoT Security
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?
 
Neotel
Neotel Neotel
Neotel
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT Networks
 
What happens if you’re not ready for the GDPR?
What happens if you’re not ready for the GDPR?What happens if you’re not ready for the GDPR?
What happens if you’re not ready for the GDPR?
 
Smart City Lab 6 - Decision Support for your Devices
Smart City Lab 6 - Decision Support for your DevicesSmart City Lab 6 - Decision Support for your Devices
Smart City Lab 6 - Decision Support for your Devices
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
 
Ics2016 scidmark-27oct2016
Ics2016 scidmark-27oct2016Ics2016 scidmark-27oct2016
Ics2016 scidmark-27oct2016
 
Cl16 wit io_t
Cl16 wit io_tCl16 wit io_t
Cl16 wit io_t
 
Internet of Things in 10 slides
Internet of Things in 10 slides Internet of Things in 10 slides
Internet of Things in 10 slides
 
Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?
Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?
Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
 
The Insecurity of Industrial Things
The Insecurity of Industrial ThingsThe Insecurity of Industrial Things
The Insecurity of Industrial Things
 
Industry 4.0 and the Industrial Internet of Things (IIoT) - e+h june 2018 ...
Industry 4.0 and the Industrial Internet of Things (IIoT) -  e+h june 2018   ...Industry 4.0 and the Industrial Internet of Things (IIoT) -  e+h june 2018   ...
Industry 4.0 and the Industrial Internet of Things (IIoT) - e+h june 2018 ...
 
Attack and Defence in Mobile Apps
Attack and Defence in Mobile AppsAttack and Defence in Mobile Apps
Attack and Defence in Mobile Apps
 
Cloud Visibility & Cloud Data Loss Prevention Approaches
 Cloud Visibility & Cloud Data Loss Prevention Approaches Cloud Visibility & Cloud Data Loss Prevention Approaches
Cloud Visibility & Cloud Data Loss Prevention Approaches
 
Internet of manufacturing and Open Source
Internet of manufacturing and Open SourceInternet of manufacturing and Open Source
Internet of manufacturing and Open Source
 
Rapid Prototyping for IoT
Rapid Prototyping for IoT Rapid Prototyping for IoT
Rapid Prototyping for IoT
 

Similaire à Internet of Things and new security challenges for the IT industry

The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)
Gerardo Pardo-Castellote
 
Wed Sponsor Press Conf - 10.15
Wed Sponsor Press Conf - 10.15Wed Sponsor Press Conf - 10.15
Wed Sponsor Press Conf - 10.15
Bessie Wang
 

Similaire à Internet of Things and new security challenges for the IT industry (20)

IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
 
The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015
 
Ignite 2015 - IoT Security and Privacy
Ignite 2015 - IoT Security and PrivacyIgnite 2015 - IoT Security and Privacy
Ignite 2015 - IoT Security and Privacy
 
IntellectEU - InsurTech Innovation Award 2022
IntellectEU - InsurTech Innovation Award 2022IntellectEU - InsurTech Innovation Award 2022
IntellectEU - InsurTech Innovation Award 2022
 
How does a Modern Integration Platform Innovate
How does a Modern Integration Platform InnovateHow does a Modern Integration Platform Innovate
How does a Modern Integration Platform Innovate
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercato
 
IntellectEU - InsurTech Innovation Award 2022
IntellectEU - InsurTech Innovation Award 2022IntellectEU - InsurTech Innovation Award 2022
IntellectEU - InsurTech Innovation Award 2022
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014
 
Wed Sponsor Press Conf - 10.15
Wed Sponsor Press Conf - 10.15Wed Sponsor Press Conf - 10.15
Wed Sponsor Press Conf - 10.15
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
 
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
 
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationTop 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integration
 
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
 
Cloudera for Internet of Things
Cloudera for Internet of ThingsCloudera for Internet of Things
Cloudera for Internet of Things
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of things
 
Debunking IoT Security Myths
Debunking IoT Security MythsDebunking IoT Security Myths
Debunking IoT Security Myths
 

Plus de Martin von Haller Groenbaek

Plus de Martin von Haller Groenbaek (20)

Joomladay 2014 - Open source licenses
Joomladay 2014 - Open source licensesJoomladay 2014 - Open source licenses
Joomladay 2014 - Open source licenses
 
Sophienberg 2012 (20 04-2012)
Sophienberg 2012 (20 04-2012) Sophienberg 2012 (20 04-2012)
Sophienberg 2012 (20 04-2012)
 
Sophienberg 2012 (19 04-2012)
Sophienberg 2012 (19 04-2012)Sophienberg 2012 (19 04-2012)
Sophienberg 2012 (19 04-2012)
 
Making Open Source More Open (23 02-2012)
Making Open Source More Open (23 02-2012)Making Open Source More Open (23 02-2012)
Making Open Source More Open (23 02-2012)
 
BAG om Creative Commons (13 01-2012)
BAG om Creative Commons (13 01-2012)BAG om Creative Commons (13 01-2012)
BAG om Creative Commons (13 01-2012)
 
Temadag om Ophavsret på Gentofte bibliotek (16-12-2011)
Temadag om Ophavsret på Gentofte bibliotek (16-12-2011)Temadag om Ophavsret på Gentofte bibliotek (16-12-2011)
Temadag om Ophavsret på Gentofte bibliotek (16-12-2011)
 
Going local (08-12-2011)
Going local (08-12-2011)Going local (08-12-2011)
Going local (08-12-2011)
 
Åbne Forretningsmodeller ITU (06-12-2011)
Åbne Forretningsmodeller ITU (06-12-2011)Åbne Forretningsmodeller ITU (06-12-2011)
Åbne Forretningsmodeller ITU (06-12-2011)
 
Åbne forretningsmodeller TI (30-11-2011)
Åbne forretningsmodeller TI (30-11-2011)Åbne forretningsmodeller TI (30-11-2011)
Åbne forretningsmodeller TI (30-11-2011)
 
Sharing is caring (11-11-2011)
Sharing is caring (11-11-2011)Sharing is caring (11-11-2011)
Sharing is caring (11-11-2011)
 
Advokaters brug af sociale medier (01 11-2011)
Advokaters brug af sociale medier (01 11-2011)Advokaters brug af sociale medier (01 11-2011)
Advokaters brug af sociale medier (01 11-2011)
 
CC UnConvention (08-10-2011)
CC UnConvention (08-10-2011)CC UnConvention (08-10-2011)
CC UnConvention (08-10-2011)
 
IDC Skyen eller Tågen (29-09-2011)
IDC Skyen eller Tågen (29-09-2011)IDC Skyen eller Tågen (29-09-2011)
IDC Skyen eller Tågen (29-09-2011)
 
Open source jura CBS (03 11-2010)
Open source jura CBS (03 11-2010)Open source jura CBS (03 11-2010)
Open source jura CBS (03 11-2010)
 
Åbne Forretningsmodeller (31-03-2011)
Åbne Forretningsmodeller (31-03-2011)Åbne Forretningsmodeller (31-03-2011)
Åbne Forretningsmodeller (31-03-2011)
 
Creative commons webgrrls (22 02-2011)
Creative commons webgrrls (22 02-2011)Creative commons webgrrls (22 02-2011)
Creative commons webgrrls (22 02-2011)
 
Open source i det offentlige (24 11-2010)
Open source i det offentlige (24 11-2010)Open source i det offentlige (24 11-2010)
Open source i det offentlige (24 11-2010)
 
Creative commons ebøger etc (02 11-2010)
Creative commons ebøger etc (02 11-2010)Creative commons ebøger etc (02 11-2010)
Creative commons ebøger etc (02 11-2010)
 
Creative commons juridisk diskussionsklub (04 11-2010)
Creative commons juridisk diskussionsklub (04 11-2010)Creative commons juridisk diskussionsklub (04 11-2010)
Creative commons juridisk diskussionsklub (04 11-2010)
 
Scl open source (15 10-2010)
Scl open source (15 10-2010)Scl open source (15 10-2010)
Scl open source (15 10-2010)
 

Dernier

Dernier (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

Internet of Things and new security challenges for the IT industry

  • 1. Internet of Things It-sikkerhed 2014 Copenhagen 5-6. February 2014
  • 2. Agenda 1.  Introduction 2.  Protecting the PC 3.  Cloud security 4.  Internet of things 5.  New security risks  6.  Openness and transparency 7.  Legal responses 8.  Conclusions 9.  Debate Page 2 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 3. 1. Introduction ●  Martin von Haller Grønbæk •  Partner, Bird & Bird •  Bird & Bird – only international law firm in Denmark •  Leading law firm on Cyber- and network security •  Former member of Danish IT Security Council •  "Open source advocate" Page 3 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 4. 2. PC as the node in the network ●  PC revolution brought “power to the people” ●  And to businesses and government – small and large ●  Rise of the general purpose computer ●  Open for attack ●  Defence of the home front ●  Internet and the network effects ●  PC as the attacked and tool for the attacker Page 4 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 5. 2. The birth of the IT Security industry ●  ●  ●  ●  ●  ●  ●  ●  ●  Critical mass market Large number of new customers Large losses looming Loss of data and downtime Inconvenience and lost productivity (and big corporate monetary losses) Malware Spam Date theft Page 5 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 6. 2. “Thou Shall Protect Thyself” ●  Self-protection ●  Liability rests with the PC-user ●  Hardware and software comes with no warranties ●  No legal protection ●  Little market for “safe IT” among consumers ●  Large market for add-on IT security software ●  Large numbers of small payments makes big profits ●  Many small and large providers Page 6 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 7. 3. New market conditions ●  ●  ●  ●  ●  ●  ●  ●  Cloud computing! No more local applications Computing takes places in the cloud Less asymmetric information Much fewer customers Dramatic shift in bargaining power And technical challenges! Goodbye, many small and large IT-security firms Page 7 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 8. 3. Is the cloud more “secure”? ●  ●  ●  ●  ●  ●  ●  Fewer amateurs and more professionals Very specialized cloud service providers Cloud as “the fog” An “oligopoly” of Clouds User has even less bargaining power Very little control of data Very little contractual and legal protection Page 8 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 9. 4. Internet of Things ●  ●  ●  ●  ●  ●  ●  Not everything is moving into the Cloud Moore Law Mobile devices Quantified self Health, Energy, Automotive etc. Nano Gartner: $1.9 trillion to the global economy by 2020 ●  Nest acquired for $3.2 billion in cash Page 9 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 10. 4. The “true” Internet ●  ●  ●  ●  ●  ●  ●  The Internet today is asymmetric More download, less upload New medium for broadcasting The Internet is decentralized by nature Read/Write Social media: Blogs before Facebook Mesh or Grid computing Page 10 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 11. 4. Towards the “real” Internet? ●  ●  ●  ●  ●  ●  ●  ●  ●  Free software vs. cloud computing (Cloud is based on open source software) Plug servers Every device = a server = a node = equal Cloud computing backlash New computing models Peer2Peer data and processor sharing Mesh or Grid computing Innovation! Page 11 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 12. 5. Before Cloud computing revisited ●  ●  ●  ●  ●  ●  ●  ●  ●  Computing moves from cloud to devices Devicesn Processing Powern Internet enabled Always on AI or Autonomous Remotely accessed and controlled Who’s the user? Self-protection? Page 12 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 13. 5. Same but bigger security risks ●  ●  ●  ●  ●  ●  ●  ●  ●  Bigger threats than PC Obvious network effects Inconvenience and lost productivity? Critical functions: Health, Auto etc. No checks on AI and automatic functions Life and death Systemic risks DDoS attacks “To Big to Fail” Page 13 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 14. 5. Unsecure today! ●  ●  ●  ●  ●  ●  ●  ●  ●  Starting point: Very unsecure Devices are shamelessly unpatched No standards Little press attention Before tipping point But it’ll come! Industry initiatives AllSeen, OpenDaylight Open Auto Alliance, Genivi Page 14 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 15. 6. Open and transparent ●  ●  ●  ●  ●  ●  ●  ●  ●  Most devices run on open source software “Closed” is not an option One platform: Linux Less diversity Economies of scale for malware Open access promotes discovery Open use lower barriers of entry for fixes Huge user advantages from open platforms Closed options where appropriate Page 15 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 16. 7. Legislation ●  ●  ●  ●  ●  ●  ●  ●  ●  Starting point: No legislation Industry standards Contractual demands Open source security services Industry and device specific legislation Heath care Transportation Privacy Service provider, not “technology” Page 16 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 17. 7. Liability ●  ●  ●  ●  ●  ●  ●  ●  ●  ●  Who assume the risk of loss? Who is the better at prevention? Consumer? Reversed burden of proof Strict liability Who should liable? Vendor, producer, provider? Don’t kill innovation! More disclosure of insecurity and breach Standards of “Good IoT IT security practices” Strict liability of certain types of devises Page 17 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 18. 7. Conclusions ●  The IT security industry as we know it will change dramatically ●  Cloud computed will see a backlash ●  Internet of Things will increase number of Internet connected computers ●  Old type security threats will re-emerge with a vengeance ●  Solutions will be based on open source software ●  Maybe new legislation on disclosure and strict liability for certain devices ●  Invest your money in new IT security start-ups with IoT solutions! Page 18 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 19. 8. Questions ●  And maybe some answers… Page 19 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 20. Thank You Martin von Haller Grønbæk Mobile: +45 40 73 19 14 Email: Martin.vonhaller@twobirds.com Bird & Bird is an international legal practice comprising Bird & Bird LLP and its affiliated and associated businesses. Bird & Bird LLP is a limited liability partnership, registered in England and Wales with registered number OC340318 and is authorised and regulated by the Solicitors Regulation Authority. Its registered office and principal place of business is at 15 Fetter Lane, London EC4A 1JP. A list of members of Bird & Bird LLP and of any non-members who are designated as partners, and of their respective professional qualifications, is open to inspection at that address. twobirds.com