The Internet of Things - The Need for Standardisation

Size: px
Start display at page:

Download "The Internet of Things - The Need for Standardisation"

Transcription

1 NEKs Ekomkonferanse 21Nov2017, Oslo The Internet of Things - The Need for Standardisation Josef Noll Department of Technology Systems, University of Oslo m: , e: josef.noll@its.uio.no IoTSec.no - SCOTT.IoTSec.no

2 The last time I was connected by wire was at birth - our when Internet of Things (IoT) meets people! The changing role of security in HMS -> HMSS! Internet has changed, IoT will accelerate the ecosystem of making business automated processes! Security in IoT teach our sensors to talk Norwegian! Standardisation new paradigm: measurable security security classes design! related to projects: Security in IoT for Smart Grids: IoTSec.no Secure Trusted IoT: SCOTT.IoTSec.no, Diversity in IoT Security: DiversIoT.IoTSec.no Need for standardisation in IoT Nov2017, Josef Noll 2

3 Source: L. Atzori et al., The Internet of Things: A survey, Comput. Netw. (2010), doi: / The Internet of Things (IoT) Things! IoT = Things + Internet + Semantics! Things that communicate with Things: computer, understand the meaning, takes own decisions Internet Semantics * security * privacy * dependability * context-aware * personalised Smart Energy - Trust Jun2017, Josef Noll 3

4 IoT - 3rd wave of convergence 1. wave: All-IP By 2020, business is dominated by [DNV-GL 2013] automated processes flat world, global business all-ip 2. wave: Telecom - IT - Broadcast from fixed to mobile and quadruple play Telecom = mobile Telco-IT 3. wave: IoT Internet The business merger core business Community Collaboration and cooperation drives developments Need for standardisation in IoT IoT Internet Nov2017, Josef Noll 4

5 Economics in IoT Jun2017, Noll et al. 5

6 National initiative for a more secure future in IoT IoTSec.no - Security in IoT for Smart Grids Academia Industry Interest Org. Industry «Open World Approach» everything that is not declared closed is open Gjøvik Kjeller Oslo Halden International IoTSec.no #IoTSecNO High level view on Security for IoT Nov 2017, Chr. Johansen, J. Noll X

7 Addressing the Threat Dimension for IoT! Hollande (FR), Merkel (DE) had their mobile being monitored! «and we believe it is not happening in Norway? [source: Süddeutsche Zeitung, 18Dec2014] [source: Need for standardisation in IoT Nov2017, Josef Noll 6

8 I Significance 16Oct2016 IoT security challenges! Mirai attack security by obscurity different security viewpoint! it is just the beginning [Source: ] Need for standardisation in IoT Nov2017, Josef Noll 7

9 Communication & IoT for society project IoTSec.no >20 partners (5 academics) Research on IoT security Building the national Security Centre for Smart Meter Internet Smart Grid Security by obscurity Open World Approach IoTSec.no Feb 2016, Josef Noll 8

10 teach our sensors to talk Norwegian Need for standardisation in IoT Nov2017, Josef Noll 9

11 SCOTT key message elevator pitch largest security project in EU 57 largest partners security from project 12 countries in EU 80 M budget 35 M EU&national largest 8 partners security from project Norway in EU IoT is the game changer and driver for digitalisation, and SCOTT contributes through: Answer the IoT need for a new and more advanced security paradigm through security classes Create a Convincing privacy assessment through privacy labelling Automotive Home Rail 5G Establish a clear link between security and safety Avionics 10

12 The trust matrix! trust as a positive user attitude engaging voluntarily! security based trust issues building trusted systems! technological factors data storage, distribution insight! human/societal factors government family, friends Smart Energy - Trust Jun2017, Josef Noll 11

13 Learn from Industrial Automation and Mobile Networks! What to secure?! Network segregation Network slicing! From Confidentiality, Service cloud #1 Service cloud #2 Softwareenabled routing Home services Appliance services Integrity, Availability VPN #1 Car services (CIA)! to Availability, Integrity, Confidentiality (AIC) Basic Internet low capacity Health services Smart Energy - Trust Jun2017, Josef Noll X

14 Security in IoT - our promises Semantic system description Understanding the system and describing security through security functionality Measurable security - the novel security concept criticality Measurable criticality Security modelling Development of privacy-aware models and measures Adopting and enhancing adaptive security for system of systems Formal languages for semantically proving signalling ideal good accep. critical failure System versus Goal analysis Application-specific security/privacy, e.g. billing vs Human/technical interface, security usability to measurable: security, privacy and dependability Operational security for IoT-based critical infrastructure IoTSec ecosystem -> extended network Roadmap for Smart Grid Security Centre (SGSC) (Gap Analysis of security methods for critical infrastructures) IoTSec.no #IoTSecNO High level view on Security for IoT Nov 2017, Chr. Johansen, J. Noll X

15 Example of Research: Multi-Metricsv2 - system composition! System consists of sub-systems criticality consists of components security system (s,p,d) ideal good accep. critical failure privacy dependability Multi-Metrics (weighted subsystems) sub-system 1 sub-system 2 (s,p,d) (s,p,d) M MM Multi-Metrics Comp. 1 Comp. 2 Comp. 3 Innovation through IoT - IoTSec.no - BasicInternet.org Nov2016, Josef Noll X

16 High level view of Security in IoT Goal Provide the means for IoT security from todays attack to tomorrows design security thinking in organisations Trust in Things Privacy label Smart Grid Security Centre facilitated through: Security classes & System design Manish Adam Smart Grid Security Centre Accountable security: - Assessment - Modelling - Framework Habtamu Olaf Toktam Seraj - Meas. Security all Heidi Håkon Øivind Privacy Label Elahe our basis: Christian Security and Privacy Functionality Josef Elahe IoTSec.no #IoTSecNO High level view on Security for IoT Nov 2017, Chr. Johansen, J. Noll 12

17 Security and Privacy Functionality IoTSec.no #IoTSecNO High level view on Security for IoT Nov 2017, Chr. Johansen, J. Noll 13

18 Security Classes and System design Security Classes in IoT New postulate of security class Consequence Exposure Consequence Consequence as in risk map Exposure Security Class Physical exposure - people, building, physical ports, IT exposure - ports, firewall, connectivity Used to assess the security class Increase weak security: - watchdog - Attribute based access control (S-ABAC) Exposure of Systems, sub-systems and components IoTSec.no #IoTSecNO High level view on Security for IoT Nov 2017, Chr. Johansen, J. Noll 14

19 Semantic attribute based access control (S-ABAC) Lifting the security class through S- ABAC GSM/LTE Access to information who (sensor, person, service) Admin Cloud what kind of information from where Attribute-based access role (in organisation, home) Smart Home Access device, network security tokens Meter reading Home-logic home owner Rules inferring access rights Smart grid operator Power control statistical data Heat pump Warm water Attributes: roles, access, device, reputation, behaviour,... IoTSec.no #IoTSecNO High level view on Security for IoT Nov 2017, Chr. Johansen, J. Noll X

20 Methodology: From System description to SPD level System/ Sub-system Is made by Components and functionalities Could be SPD Components, SPD functionalities described by Metrics description (SPD functionality) define config. parameters and SPD values in Metrics Run SPD Multimetrics analysis System: Automatic Meter System (AMS) consists of reader (AMR), aggregator, communications, storage, user access Sub-systems: AMR consists of power monitor, processing unit, communication unit Component: AMR communication contains of a baseband processing, antenna, wireless link Configuration Parameter: Wireless link: f=868 MHz, output power=?, Encryption=? IoTSec.no #IoTSecNO High level view on Security for IoT Nov 2017, Chr. Johansen, J. Noll X

21 Accountable security system (s,p,d) Assessment Comparison desired Class vs sub-system 1 (s,p,d) Multi-Metrics (weighted subsystems) sub-system 2 (s,p,d) Calculated class PROSA modelling M MM Multi-Metrics Modelling Comp. 1 Comp. 2 Comp. 3 SPD Metrics, from criticality to SPD value Framework Examples of applicability criticality Measurable criticality to measurable: security, privacy and dependability Measurable Security Security is not 0/1 ideal good accep. critical failure IoTSec.no #IoTSecNO High level view on Security for IoT Nov 2017, Chr. Johansen, J. Noll 15

22 SmartGridSecurity Logo

23 Mission Statement We help the Utility Companies achieve their smart grid goals with higher resiliency and quicker response times against security threats.

24 Privacy Labelling Measure, what you can measure - Make measurable, what you can t measure - Galileo Privacy today based on lawyer terminology words on app terms and conditions Privacy tomorrow A++: sharing with no others A: C: sharing with. The Privacy label for apps and devices IoTSec.no #IoTSecNO High level view on Security for IoT Nov 2017, Chr. Johansen, J. Noll 16

25 Answer the Challenges addressed by the EU SCOTT contribution: privacy label? IoTSec.no #IoTSecNO High level view on Security for IoT Nov 2017, Chr. Johansen, J. Noll X

26 Helse, Miljø og Sikkerhet IoT attack -> car crashes? safety! Security affects safety! Security affects core business company confidential information Customer information Privacy regulative (GDPR May2018): 4% of revenue Board of directors IoT is corporate governance Finance, HMS security and safety CEO Buz #1 #2 #3 #4 Need for standardisation in IoT Nov2017, Josef Noll 17

27 Conclusions Service cloud #1 Service cloud #2 Softwareenabled routing VPN #1 Home services Appliance services Car services! Things (IoT) are driving the digital societies! IoT: Business merger Basic Internet low capacity Health services Internet + Semantics + Things = IoT Digitisation of the Society! IoT Security and privacy new security paradigm Security classes, accountable security - security and privacy ontology! competitive advantage e.g.: - Privacy label (A++, A+ D) Smart Energy - Trust Jun2017, Josef Noll 18

Sensor technology - Applications and Challenges

Sensor technology - Applications and Challenges Teknologitimen, Senter for Rettsinformatikk (SERI), 3Apr2018, Oslo Sensor technology - Applications and Challenges Josef Noll, Christian Johansen Department of Technology Systems, University of Oslo m:

More information

Collaboration for a more secure Smart Grid operation

Collaboration for a more secure Smart Grid operation Smart Energy 2017, Halden, Feb 2017 Collaboration for a more secure Smart Grid operation Josef Noll, Christian Johansen UiO IoTSec Project leader/coo jnoll@uio.no, christi@ifi.uio.no #IoTSec, IoT - how

More information

L2 - Internet of Things

L2 - Internet of Things UNIK4750 - Measurable Security for the Internet of Things L2 - Internet of Things György Kálmán, UiO/NTNU/mnemonic gyorgy.kalman@its.uio.no Josef Noll UiO/UNIK josef.noll@its.uio.no http://cwi.unik.no/wiki/unik4750,

More information

L7 Security Semantics

L7 Security Semantics UNIK4750 - Measurable Security for the Internet of Things L7 Security Semantics György Kálmán, UiO/DNB gyorgy.kalman@its.uio.no Josef Noll UiO josef.noll@its.uio.no http://cwi.unik.no/wiki/unik4750, #IoTSec,

More information

IoTSec - Security in IoT for Smart Grids

IoTSec - Security in IoT for Smart Grids www.nr.no IoTSec - Security in IoT for Smart Grids AFSecurity Seminar, Secure October - Security R&D @ UiO and Partners Habtamu Abie, Norwegian Computing Center - NR IFI/Oslo 09/10/2015 IoTSec - Challenges

More information

WP1. Semantic System Description. by Olaf Owe (UiO)

WP1. Semantic System Description. by Olaf Owe (UiO) WP1 Semantic System Description by Olaf Owe (UiO) WP1 team Olaf Owe (PMA group leader, leader Conserns) Josef Noll (at UNIK and Movation as well) Christian Johansen (50% IoTSec), senior researcher (UNIK

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

SCOTT Methodology for Building Blocks and Use Cases

SCOTT Methodology for Building Blocks and Use Cases SCOTT - Jan2018 SCOTT Methodology for Building Blocks and Use Cases Josef Noll, Maghsoud Morshedi, Toktam Ramezani secure connected trustable things SCOTT has received funding from the Electronic Component

More information

DT-ICT : Big data solutions for energy

DT-ICT : Big data solutions for energy DT-ICT-11-2019: Big data solutions for energy info day Stefano Bertolo, DG CONNECT Mario Dionisio, DG ENER Scientific Programme Officers Who we are DG CONNECT, Unit G1 Data Policy and Innovation DG ENERGY,

More information

Regulation and the Internet of Things

Regulation and the Internet of Things Regulation and the Internet of Things 15 th Global Symposium for Regulators (GSR15) Prof. Ian Brown The views expressed in this presentation are those of the author and do not necessarily reflect the opinions

More information

Access Control and Physical Security Management. Contents are subject to change. For the latest updates visit

Access Control and Physical Security Management. Contents are subject to change. For the latest updates visit Access Control and Physical Security Management Page 1 of 6 Why Attend Today s security landscape requires individuals and businesses to take the threat to safety and security seriously. Safe and secure

More information

Intelligent Buildings and Cybersecurity

Intelligent Buildings and Cybersecurity Intelligent Buildings and Cybersecurity March 14-18,2017 Frankfurt, Germany Ron Zimmer CABA President & CEO www.caba.org Connect to what s next 1 CABA Board of Directors and Vision CABA Vision Statement

More information

Security and networks

Security and networks Security and networks Creating a secure business in a hyper connected world SHIV K. BAKHSHI, PH.D. VP, INDUSTRY RELATIONS, GROUP FUNCTION TECHNOLOGY ITU Regional workshop, Algiers, Algeria, FeBruary 12,

More information

ENCS The European Network for Cyber Security

ENCS The European Network for Cyber Security ENCS The European Network for Cyber Security A not-for-profit European Public Private Partnership on cyber security for critical infrastructures Initial focus: smart grids and process control, to be extended

More information

Thrive in today's digital economy

Thrive in today's digital economy Thrive in today's digital economy TABLE OF CONTENTS "Connectivity redefines everything, and we have believed in its transformative power for decades. Fifty years ago, we integrated intelligence in machines

More information

Thrive in today's digital economy

Thrive in today's digital economy Thrive in today's digital economy "Connectivity redefines everything, and we have believed in its transformative power for decades. Fifty years ago, we integrated intelligence in machines and automated

More information

Digital transformation in the Networked Society. Milena Matic Strategy, Marketing & Communications June 2016

Digital transformation in the Networked Society. Milena Matic Strategy, Marketing & Communications June 2016 Digital transformation in the Networked Society Milena Matic Strategy, Marketing & Communications June 2016 Connections (billion) Everything that benefits from a connection will be connected 50 Our vision

More information

SECURING THE CONNECTED ENTERPRISE.

SECURING THE CONNECTED ENTERPRISE. SECURING THE CONNECTED ENTERPRISE. IT S ONLY A MATTER OF TIME. WILL YOU BE READY? NITISH SHRIVASTAVA DIRECTOR, HARMAN CONNECTED SERVICES EVERYTHING WAS FINE THEN THIS HAPPENED. INTERNET GOES DOWN DAMAGE

More information

D Analysis of IoT Sec Ecosystem. By Konstantin Lenchik Supervisor: Prof. Einar Arthur Snekkenes, Prof. Josef Noll

D Analysis of IoT Sec Ecosystem. By Konstantin Lenchik Supervisor: Prof. Einar Arthur Snekkenes, Prof. Josef Noll D 4.1.1 Analysis of IoT Sec Ecosystem By Konstantin Lenchik Supervisor: Prof. Einar Arthur Snekkenes, Prof. Josef Noll Defined groups of Stakeholders 1. Production of energy 2. TSO 3. DSO 4. Security companies

More information

Authentication with Privacy for Connected Cars - A research perspective -

Authentication with Privacy for Connected Cars - A research perspective - Authentication with Privacy for Connected Cars - A research perspective - Mark Manulis Surrey Centre for Cyber Security, Deputy-Director Department of Computer Science University of Surrey sccs.surrey.ac.uk

More information

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING

More information

INtelligent solutions 2ward the Development of Railway Energy and Asset Management Systems in Europe.

INtelligent solutions 2ward the Development of Railway Energy and Asset Management Systems in Europe. INtelligent solutions 2ward the Development of Railway Energy and Asset Management Systems in Europe. Introduction to IN2DREAMS The predicted growth of transport, especially in European railway infrastructures,

More information

Discussion on MS contribution to the WP2018

Discussion on MS contribution to the WP2018 Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several

More information

European nanoelectronics innovation: One strategy Multiple instruments

European nanoelectronics innovation: One strategy Multiple instruments European nanoelectronics innovation: One strategy Multiple instruments Fred van Roosmalen Vice President NXP Semiconductors European Nanoelectronics Forum 2014 Cannes, November 27, 2014 Connected Car Security

More information

Internet of Things Toolkit for Small and Medium Businesses

Internet of Things Toolkit for Small and Medium Businesses Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors

More information

European Union Agency for Network and Information Security

European Union Agency for Network and Information Security Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency

More information

R&D on Trust & Security. Vilija Juceviciene European Commission Information Society and Media Directorate General Unit F5 - Trust & Security

R&D on Trust & Security. Vilija Juceviciene European Commission Information Society and Media Directorate General Unit F5 - Trust & Security Overview of DG INFSO R&D on Trust & Security Vilija Juceviciene European Commission Information Society and Media Directorate General Unit F5 - Trust & Security Setting the scene - The Digital Wave Sophia

More information

EU Innovation Investments: The Challenges met by Innovation Infrastructures Today in Europe

EU Innovation Investments: The Challenges met by Innovation Infrastructures Today in Europe EU Innovation Investments: The Challenges met by Innovation Infrastructures Today in Europe Ronan Burgess Acting Head of Unit A1 Photonics Directorate A - Components and Systems DG CONNECT, European Commission

More information

This is the Next Industrial Revolution: The Industrial Internet. 8 February 2017

This is the Next Industrial Revolution: The Industrial Internet. 8 February 2017 This is the Next Industrial Revolution: The Industrial Internet 8 February 2017 A fundamental new rule for business is that the Internet changes everything. -Bill Gates, 1999 Or has it? February 13, 2017

More information

Shaping Tomorrow s Sustainable

Shaping Tomorrow s Sustainable Shaping Tomorrow s Sustainable Cities Today: The Role of ITU Cristina Bueti Adviser and ITU Focal Point on Environment and Climate Change 1 City is an Holistic System economically compete sustainably

More information

Second Workshop of India-EU Collaboration on Standardization for Select Technologies

Second Workshop of India-EU Collaboration on Standardization for Select Technologies Second Workshop of India-EU Collaboration on Standardization for Select Technologies TSDSI s Vision & Roadmap for 5G Nov 05, 2015 Vinosh James Lead, Technical Standards for Qualcomm, and Chair, 5G WG of

More information

R&D to shape the networks and services of the future

R&D to shape the networks and services of the future R&D to shape the networks and services of the future IEEE-ICC'13 Budapest, 12 th June 2013 Panel: Horizon 2020 Europe's major new collaborative R&D Programme Luis Rodríguez-Roselló European Commission

More information

Clarity on Cyber Security. Media conference 29 May 2018

Clarity on Cyber Security. Media conference 29 May 2018 Clarity on Cyber Security Media conference 29 May 2018 Why this study? 2 Methodology Methodology of the study Online survey consisting of 33 questions 60 participants from C-Level (CISOs, CIOs, CTOs) 26

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational

More information

Innovation policy for Industry 4.0

Innovation policy for Industry 4.0 Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda

More information

Building a Resilient Security Posture for Effective Breach Prevention

Building a Resilient Security Posture for Effective Breach Prevention SESSION ID: GPS-F03B Building a Resilient Security Posture for Effective Breach Prevention Avinash Prasad Head Managed Security Services, Tata Communications Agenda for discussion 1. Security Posture 2.

More information

ERCI cybersecurity seminar Guildford ERCI cybersecurity seminar Guildford

ERCI cybersecurity seminar Guildford ERCI cybersecurity seminar Guildford Cybersecurity is a EU strategic priority DG CONNECT* > The Digital Single Market strategy aims to open up digital opportunities for people and business and enhance Europe's position as a world leader in

More information

Securing the Cloud Today: How do we get there?

Securing the Cloud Today: How do we get there? Samson Tai, Chief Technologist, IBM Innovation Network Securing the Cloud Today: How do we get there 9/15/2009 What is Cloud Computing Cloud is a new consumption and delivery model for many IT-based services,

More information

The Programmable World Opportunities and Challenges

The Programmable World Opportunities and Challenges The Programmable World Opportunities and Challenges Guillaume Mascot Head of Government Relations APJ & India March 2017 1 Nokia 2016 Megatrends are bringing the programmable world Network, compute & storage

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

Quality Assurance in 5G SME Engagement

Quality Assurance in 5G SME Engagement Quality Assurance in 5G SME Engagement Janez Sterle 2017 Internet Institute. All Rights Reserved. 5G PPP - Information Day Ljubljana; October 2017 INTERNET INSTITUTE Ltd. SME from Ljubljana, Slovenia Established

More information

Cisco Connected Factory Accelerator Bundles

Cisco Connected Factory Accelerator Bundles Data Sheet Cisco Connected Factory Accelerator Bundles Many manufacturers are pursuing the immense business benefits available from digitizing and connecting their factories. Major gains in overall equipment

More information

Intelligent Building and Cybersecurity 2016

Intelligent Building and Cybersecurity 2016 Intelligent Building and Cybersecurity 2016 Landmark Research Executive Summary 2016, Continental Automated Buildings Association Presentation Contents 1. About CABA, Compass Intelligence & This Research

More information

Sviluppi e priorità europee nel settore delle smart grids. M. de Nigris

Sviluppi e priorità europee nel settore delle smart grids. M. de Nigris Sviluppi e priorità europee nel settore delle smart grids M. de Nigris DRIVERS FOR AN ENERGY (R)EVOLUTION IN EUROPE INCREASING ENERGY BILL EUROPEAN ENERGY BILL FOR IMPORT: 1 b /DAY VOLATILITY OF ENERGY

More information

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure

More information

INSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS. Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom

INSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS. Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom INSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom CAUTIONARY STATEMENT This presentation may contain forward-looking statements

More information

The MovingLife Project

The MovingLife Project The MovingLife Project MObile ehealth for the VINdication of Global LIFEstyle change and disease management solutions Stakeholders Conference The MovingLife Roadmaps Brussels 18 April 2013 Alessio Gugliotta

More information

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson Supply Chain Integrity and Security Assurance for ICT Mats Nilsson The starting point 2 B Internet users 85% Population coverage 5+ B Mobile subscriptions 10 years of Daily upload E-Books surpassing Print

More information

Upcoming EC Systems Research Perspectives

Upcoming EC Systems Research Perspectives Upcoming EC Systems Research Perspectives Neeraj Suri Dept. of Computer Science TU Darmstadt, Germany Dependable Embedded Systems & SW Group www.deeds.informatik.tu-darmstadt.de EU Computing Systems Strategy

More information

Making 5G a commercial reality

Making 5G a commercial reality Making 5G a commercial reality Dr. Brahim GHRIBI Head of Government Relation Middle East & Africa Nokia 1 Nokia 2016 Public The journey for human technology Mobile networks today and tomorrow Mobile Voice

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

CIO Forum Maximize the value of IT in today s economy

CIO Forum Maximize the value of IT in today s economy CIO Forum Maximize the value of IT in today s economy Laura Scott, Vice President Service Product Line Sales Global Technology Services IT infrastructure is reaching a breaking point. 85% idle In distributed

More information

Internet of Things: Driving the Transformation

Internet of Things: Driving the Transformation Internet of Things: Driving the Transformation Annabel Nickles, PhD, MBA Director, Emerging Platform Solutions Integrated Computing Research Intel Labs 1 What Are People Saying about IOT? Vol. 12345 Nr.001

More information

Smart Systems and Heat

Smart Systems and Heat Smart Systems and Heat 02 03 Why? Our Smart Systems and Heat programme is focused on creating future-proof and economic local heating solutions for the UK Heat accounts for over 40% of the UK s demand

More information

National Institute of Standards and Technology

National Institute of Standards and Technology National Institute of Standards and Technology April 2017 1 ITL Mission ITL promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and related technology through

More information

FINLAND & SMART ENERGY. Pekka Sivonen Executive Director Digital Transformation of Finnish Industries May 2018

FINLAND & SMART ENERGY. Pekka Sivonen Executive Director Digital Transformation of Finnish Industries May 2018 FINLAND & SMART ENERGY Pekka Sivonen Executive Director Digital Transformation of Finnish Industries May 2018 DIGITALISATION DIGITALISATION: VISION VISION AND MISSION Simplifying smart: We will make the

More information

Introduction of the Industrial Internet Consortium. May 2016

Introduction of the Industrial Internet Consortium. May 2016 Introduction of the Industrial Internet Consortium May 2016 An Open Membership Consortium now 250 companies strong May 26, 2016 2 IIC Founders, Contributing Members, & Large Industry Members IIC Founding

More information

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) Sekhar KONDEPUDI Ph.D. Vice Chair FG-SSC & Coordinator Working Group 1 ICT role and roadmap for

More information

Smart Energy Programme. Pia Salokoski

Smart Energy Programme. Pia Salokoski Smart Energy Programme Pia Salokoski Smart Energy Programme Smart Energy - Joint Programme between Tekes and Finpro 2017-2021 Connectivity and integration are driving new energy technologies, industry

More information

Internet of Things, A European Outlook Antonis Tzortzakakis, Treasurer ECTA

Internet of Things, A European Outlook Antonis Tzortzakakis, Treasurer ECTA Internet of Things, A European Outlook Antonis Tzortzakakis, Treasurer ECTA Internet of Things IoT represents the next step towards the digitalisation of our society and economy, where objects and people

More information

Standards for V2X Communication and Implications for OEMs and ITS

Standards for V2X Communication and Implications for OEMs and ITS Standards for V2X Communication and Implications for OEMs and ITS FISITA Jürgen Daunis London Nov. 12, 2015 PACE OF CHANGE >50 billion connected devices Connections (billion) 25 years 5 billion connected

More information

Implementing Executive Order and Presidential Policy Directive 21

Implementing Executive Order and Presidential Policy Directive 21 March 26, 2013 Implementing Executive Order 13636 and Presidential Policy Directive 21 Mike Smith, Senior Cyber Policy Advisor, Office of Electricity Delivery and Energy Reliability, Department of Energy

More information

Grid BT. The evolution toward grid services. EU Grid event, Brussels May Piet Bel Grid Action Team

Grid BT. The evolution toward grid services. EU Grid event, Brussels May Piet Bel Grid Action Team Grid Computing @ BT The evolution toward grid services EU Grid event, Brussels May 31 05 Piet Bel Grid Action Team Agenda BT Why Grid? What is BT doing? Evolution of Grid Services Q & A 2 Forward-looking

More information

Horizon 2020 Security

Horizon 2020 Security Horizon 2020 Security Best Practices for Security Proposal Writing Armand Nachef Coordinator of the French Security NCP Consortium, CEA armand.nachef@cea.fr KEY MESSAGES FOR PUTTING TOGETHER A HORIZON

More information

Smart Systems and Heat

Smart Systems and Heat Smart Systems and Heat 02 03 Energy Technologies Institute www.eti.co.uk Why? Our Smart Systems and Heat programme is focused on creating future-proof and economic local heating solutions for the UK Heat

More information

Enhancing the cyber security &

Enhancing the cyber security & Enhancing the cyber security & resilience of transport infrastructure in Europe European Union Agency for Network and Information Security Securing Europe s Information society 2 Positioning ENISA activities

More information

The Internet of Things and Security

The Internet of Things and Security INTERNAL USE ONLY The Internet of Things and Security Chuck DePalma CISSP CISM Network and Cloud Security Architect The Internet of Things 1998 Adoption of Mosaic Browsers 0ver 250 Millions of Internet

More information

Policy Session 4 Identifying Risk: An abundance of Potential Shock Waves

Policy Session 4 Identifying Risk: An abundance of Potential Shock Waves Policy Session 4 Identifying Risk: An abundance of Potential Shock Waves Ray Stanton Interim Group CiSO & Director Digital Risk, National Grid &, Group CiSO/CiRO, Redwood Technologies Group 9 th May 2017

More information

European Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016

European Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016 European Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016 Présentation Géraud Canet geraud.canet@cea.fr ABOUT THE CYBERSECURITY cppp 3 AIM 1. Foster cooperation between public

More information

How the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015

How the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015 How the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015 Claudia Prettner, Unit for Health and Well-Being, DG CONNECT Table of

More information

Digital Co-Creation with Hybrid IT. Fujitsu World Tour 2017

Digital Co-Creation with Hybrid IT. Fujitsu World Tour 2017 Digital Co-Creation with Hybrid IT Fujitsu World Tour 2017 0 Copyright 2017 FUJITSU The Industrial Revolution The original disruptor that brought us to a new world The Industrial Revolution was a period

More information

Orange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November

Orange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November Orange Smart Cities Smart Metering and Smart Grid : how can a telecom operator contribute? November 5 2012 Nathalie Leboucher Vice President Smart Cities Program Orange 1 the Orange Group in a nutshell

More information

Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS

Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS Stephanie Poe, DNP, RN-BC CNIO, The Johns Hopkins Hospital and Health System Discussion Topics The Age of Acceleration Cyber

More information

DEx. Other initiatives, ongoing projects and applications within the strategic program Automotive Security and Privacy.

DEx. Other initiatives, ongoing projects and applications within the strategic program Automotive Security and Privacy. DEx Other initiatives, ongoing projects and applications within the strategic program Automotive Security and Privacy Lars Moberger Research Institutes of Sweden BUILT ENVIRONMENT ENERGY AND CIRCULAR ECONOMY

More information

NCCoE TRUSTED CLOUD: A SECURE SOLUTION

NCCoE TRUSTED CLOUD: A SECURE SOLUTION SESSION ID: SPO1-W14 NCCoE TRUSTED CLOUD: A SECURE SOLUTION Donna Dodson Associate Director Chief Cyber Security Advisor of the Information Technology Laboratory, Chief Cybersecurity Advisor for the National

More information

Media (NEM) Initiative

Media (NEM) Initiative Networked and Electronic Media (NEM) Initiative NEM Initiative and involvement of Game developers Possibilities for participation in the new EU funding work programme 2011 Dr.-Ing. Halid Hrasnica Eurescom

More information

CHALLENGES GOVERNANCE INTEGRATION SECURITY

CHALLENGES GOVERNANCE INTEGRATION SECURITY CLOUD SERVICES The adoption and migration to the cloud is rooted in the need for speed and flexibility in creating and managing services. These benefits are often impacted by the difficulty of enterprises

More information

The world's leading Provider of open source Enterprise IT products and services Rainer Liedtke

The world's leading Provider of open source Enterprise IT products and services Rainer Liedtke The world's leading Provider of open source Enterprise IT products and services Regional Director EMEA Sales, Country Manager Germany 1 Status Of Open Source Software Adoption 2 What Do These Numbers Represent?

More information

Digital (Virtual) Identities in Daidalos and beyond. Amardeo Sarma NEC Laboratories Europe

Digital (Virtual) Identities in Daidalos and beyond. Amardeo Sarma NEC Laboratories Europe Digital (Virtual) Identities in Daidalos and beyond Amardeo Sarma NEC Laboratories Europe Who wants to pay for more Bandwidth? More Access Bandwidth? No one pays extra for volume or time plain usage is

More information

Towards an integrated regulation platform in Luxembourg. Information Security Education Day th of april

Towards an integrated regulation platform in Luxembourg. Information Security Education Day th of april Towards an integrated regulation platform in Luxembourg Information Security Education Day 2017-28 th of april Context A complex and inter-connected digital ecosystem contributing to all sectors A set

More information

DIGITAL TRUST Making digital work by making digital secure

DIGITAL TRUST Making digital work by making digital secure Making digital work by making digital secure MARKET DRIVERS AND CHALLENGES THE ROLE OF IT SECURITY IN THE DIGITAL AGE 2 In today s digital age we see the impact of poor security controls everywhere. Bots

More information

New Digital Business Models Driving the Softwarization of the Network

New Digital Business Models Driving the Softwarization of the Network New Digital Business Models Driving the Softwarization of the Network Marc Halbfinger January 2018 Here To Serve Headquartered in Hong Kong PCCW consolidated 2016 Revenue: US$4.9 billion HKT 2016 Revenue:

More information

Big Data Value cppp Big Data Value Association Big Data Value ecosystem

Big Data Value cppp Big Data Value Association Big Data Value ecosystem Big Data Value cppp Big Data Value Association Big Data Value ecosystem Laure Le Bars, SAP, BDVA President and BDVe lead Nuria de Lama, ATOS, BDVA Deputy Secretary General, BDVe co-lead Ana García Robles,

More information

H2020-LEIT-ICT WP European Data Infrastructure ICT-13 Supporting the emergence of data markets and the data economy

H2020-LEIT-ICT WP European Data Infrastructure ICT-13 Supporting the emergence of data markets and the data economy H2020-LEIT-ICT WP2018-2020 European Data Infrastructure ICT-13 Supporting the emergence of data markets and the data economy Kimmo Rossi DG CNECT.G1 Data Policy and Innovation Unit Problem statement Sharing

More information

Cyber Security in Europe and CEER s new PEER initiative

Cyber Security in Europe and CEER s new PEER initiative NARUC-CEER International Forum, 27 April 2017, Arlington, Virginia Cyber Security in Europe and CEER s new PEER initiative Lord Mogg, CEER President Outline New EU legislativedevelopments: NIS Directive

More information

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies

More information

Cisco 5G Now! Product Announcements. February, 2018

Cisco 5G Now! Product Announcements. February, 2018 Cisco 5G Now! Product Announcements February, 2018 Mobile Cloud Services 2017 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Application Access (%) Displacing Legacy, Mobile

More information

S1.1: RESEARCH AND DEVELOPMENT IN EUROPE FOR COMPETITIVE MANUFACTURING. Competitiveness of Industry by means of Cross Fertilisation

S1.1: RESEARCH AND DEVELOPMENT IN EUROPE FOR COMPETITIVE MANUFACTURING. Competitiveness of Industry by means of Cross Fertilisation S1.1: RESEARCH AND DEVELOPMENT IN EUROPE FOR COMPETITIVE MANUFACTURING Competitiveness of Industry by means of Cross Fertilisation STORYLINE: FOCUS ON KEY ENABLERS FOR DISTRIBUTED INDUSTRIALS SYSTEMS HOW

More information

Transforming the utilities industry. How our insight and infrastructure can help you thrive in a changing world

Transforming the utilities industry. How our insight and infrastructure can help you thrive in a changing world Transforming the utilities industry How our insight and infrastructure can help you thrive in a changing world The utilities industry is changing You need to be leaner, greener and smarter. And we re here

More information

Smart Energy. Neil Pennington, Director of Smart Innovation

Smart Energy. Neil Pennington, Director of Smart Innovation Smart Energy Neil Pennington, Director of Smart Innovation 1 Standard disclaimer I will not > Provide a party political broadcast on behalf of the npower party!! > Seek to score political points all Suppliers

More information

Mobile Connect Driving Global Economic Growth Through Secure Mobile Identity

Mobile Connect Driving Global Economic Growth Through Secure Mobile Identity Mobile Connect Driving Global Economic Growth Through Secure Mobile Identity Marta Ienco, Regulatory and Policy Director 21 st April 2016 UNCITRAL Colloquium on Legal issue Related to Identity Management

More information

GDPR: The Day After. Pierre-Luc REFALO

GDPR: The Day After. Pierre-Luc REFALO GDPR: The Day After Pierre-Luc REFALO The speaker: Pierre-Luc REFALO Global Head of Strategic Cybersecurity Consulting 25+ years in Information & Cyber Security consultancy CISO for SFR & Vivendi Universal

More information

IEEE-SA Internet of Things - Security & Standards

IEEE-SA Internet of Things - Security & Standards IEEE-SA Internet of Things - Security & Standards Srikanth Chandrasekaran IEEE Standards Association MOBILE WORLD CONGRESS, SHANGHAI JUNE 2018 What does the IEEE Standards Association (IEEE-SA) do? Vision:

More information

RSA Advanced Cyber Defence Summit

RSA Advanced Cyber Defence Summit Lee Edge Head Archer Business UK&I RSA Advanced Cyber Defence Summit London 30-April-2015 1 64% 8% 2014 Gartner CEO and Senior Executive Survey: 'Risk-On' Attitudes Will Accelerate Digital Business. 2

More information

PRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser. CSP2015 Brussels /

PRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser. CSP2015 Brussels / PRISMACLOUD Privacy and Security Maintaining Services in the Cloud Thomas Loruenser CSP2015 Brussels / 29.04.2015 Challenges for future ICT Cloud computing will be at the heart of future ICT systems The

More information

National Cybersecurity Center of Excellence

National Cybersecurity Center of Excellence National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Briefing to ITEA Cyber Workshop 29 March 2017 STRATEGY VISION ADVANCE CYBERSECURITY

More information

Webinar on 5G funding opportunities for EU-US collaboration in Horizon 2020

Webinar on 5G funding opportunities for EU-US collaboration in Horizon 2020 Webinar on 5G funding opportunities for EU-US collaboration in Horizon 2020 Prof. Gerhard Fettweis Vodafone Chair Professor at TU Dresden Coordinator 5G Lab Germany PICASSO 5G Networks Expert Group Chair

More information

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT Tom Gibbings Market Development Manager 2017 WIND RIVER. ALL RIGHTS RESERVED. IOT IS CHANGING HOW WE LIVE AND WORK 2 2017 WIND RIVER.

More information

Third annual ITU IMT-2020/5G Workshop and Demo Day 2018

Third annual ITU IMT-2020/5G Workshop and Demo Day 2018 All Sessions Outcome Third annual ITU IMT-2020/5G Workshop and Demo Day 2018 Geneva, Switzerland, 18 July 2018 Session 1: IMT-2020/5G standardization (part 1): activities and future plan in ITU-T SGs 1.

More information